StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Voter Security Authentication for Online Voting - Essay Example

Comments (0) Cite this document
Summary
The paper "Voter Security Authentication for Online Voting" states that the voting system requires continuous auditing, multi-prolonged testing for development stages in implementation phases. This is important for the voting system before, during and after the voting system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
Voter Security Authentication for Online Voting
Read Text Preview

Extract of sample "Voter Security Authentication for Online Voting"

Download file to see previous pages Currently, there are various versions of e-voting schemes under trial. It has been argued that e-voting will have the following salutary effects; the disadvantaged communities will have an equal voting opportunity which is an antidote for voter apathy, convenience in voting in relation to time, location, and accessibility for the disabled, saving time, and great accuracy. On the other hand, information systems technology experts have raised questions on related e-voting security issues. The process has special challenges that threaten its success to ensure and assure fair elections and embed voter confidence in the system. Voter authentication, integrity, and auditing of elections are some issues of concern with this system.
There are systematic approaches to assessing and managing risks in organizations such as OCTAVE. The OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation) approach identifies assets to be protected, the risks that may occur to the assets and how it would be effective to protect them and the cost it would take to protect the assets.
Assets that are very crucial and must be protected are those that will be used to determine the winner in the election, this will help win the confidence of the voters. The voting criteria of each election should be able to make sure that the voter anonymity, confidentiality, integrity and audit ability are guaranteed, this will help the election be fair and voters’ security.
Trojan horse installed by the DRE vendor could be used to create a wholesale compromise of the election, and detecting such threats might be difficult especially if it has been installed using obfuscation techniques.
Trade secrecy, this threat prevents examination and adequate testing of software, the countermeasures to such a threat is that it should be provided with open system components and the code inspection and testing which should be provided by the vendor. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Voter Security Authentication for Online Voting Essay Example | Topics and Well Written Essays - 1750 words, n.d.)
Voter Security Authentication for Online Voting Essay Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/1817782-enterprise-information-security
(Voter Security Authentication for Online Voting Essay Example | Topics and Well Written Essays - 1750 Words)
Voter Security Authentication for Online Voting Essay Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1817782-enterprise-information-security.
“Voter Security Authentication for Online Voting Essay Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/1817782-enterprise-information-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Voter Security Authentication for Online Voting

Web security authentication and authorization

...Voter Security Authentication for Online Voting... Voter Security Authentication for Online Voting... Full Paper Authentication Mechanism If a particular resource needs to be protected, using elementary authentication mechanism, Apache server sends a header including “401 authentications” in repose to the request. As the user enter credentials, consisting of username and password, for the resource to be returned as requested. Moreover, as soon as 401 response headers receive by the web browser, it asks the user to specify username and password in order to authenticate the user. Similarly, the server will check the credentials in the safe list, if they are available; the resource is made available to the user. Securing the Contents For any...
3 Pages (750 words) Research Paper

Survey on Security in Electronic Voting Systems

...Voter Security Authentication for Online Voting... Voter Security Authentication for Online Voting... Survey paper on Electronic voting protocols Research Papers The Article on E-Voting using Double-Blind Identity-Based Encryption explains a model that uses double blind encryption based on the user identity. The model is explained as an extension of the blind IBE schemes which allow the user to construct an identity string that is partially concealed to the key generation center (KGC) and the KGC to add to the constructed string that are concealed from the user. The advantages of the E-Voting System: It provides secrecy and protects the privacy of the voter since the vote is cast anonymously. The credentials of the voter are only checked prior to ...
8 Pages (2000 words) Essay

Security in Electronic Voting Systems

...Voter Security Authentication for Online Voting... Voter Security Authentication for Online Voting... Task Security in Electronic Voting Systems Introduction Voting is all about data collection and accuracy, with time and cost being an important factor in the terms of efficiency. Electronic voting uses computerized equipment in the process of vote casting. Electronic voting systems seek to reduce time consumption during any type of voting and increase participation (Liaw, p 108). It also improves the accuracy of results and lowers the cost of conducting elections. There is an advanced online voting system used in universities for teaching and voting, whereby the students vote anytime and anywhere using both fixed and mobile devices such as...
7 Pages (1750 words) Case Study

Voting

...Voter Security Authentication for Online Voting... Voter Security Authentication for Online Voting... On November 5th every election year, the excuses begin concerning the National Presidential Election and people's failure to vote. Coffee and water cups are filled as co-workers expand on their latest reasons for not voting. The biggest excuses are that they were too busy to make it to the polls, and they couldn't make a decision. They didn't know anything about the candidates. These same individuals will claim later as their Social Security payments, educational benefits, or gas prices soar that they were victims of circumstance from the bad policies of corrupt politicians. However, Americans are not feathers on the wind of government....
6 Pages (1500 words) Essay

Online Security

...Voter Security Authentication for Online Voting... Voter Security Authentication for Online Voting... online security threats be removed altogether' Discuss. With the advent of internet the life of a common man has changed toa considerable extent. Before the introduction of internet, people have to spend hours in libraries to find relevant information but not any more. Although internet is widely used to get specific information but the facility of online shopping is nothing less than a blessing. But, it doesn't really matter if you use internet to get information or to shop around, you have to face certain security threats as there is an overwhelming increase in the cyber crime over the last few years. According to the FBI, the number of...
7 Pages (1750 words) Essay

Voter Psychology

...Voter Security Authentication for Online Voting... Voter Security Authentication for Online Voting... ASSIGNMENT ONE After reading the entire pages of Anthony Downs' book, it can be rightfully concluded that his textbook is not only intended for American voters and readers but for the whole humanity that exercises democracy. It is characterized not only by its universality but also by its timelessness . His work is a dissection and crossexamination of voter psychology among other topics. Downs clarifies that there are 2 kinds of voters i.e. rational and irrational but this paper delves only into the rational voters' psyche. He further elucidates that there are so many bases of voter's preference i.e. why voters cast their ballots for this cand...
5 Pages (1250 words) Essay

Security through Authentication and Encryption

...Voter Security Authentication for Online Voting... Voter Security Authentication for Online Voting... through Authentication and Encryption Abstract Security enhancement strategies do not only allow access to solely employees, who are responsible for maintaining and operating systems, but to manage their systems or online businesses in a way that limits online access so as to prevent any possible threats and attacks. This includes first and foremost the notion that data or any correspondence between the business and the customer to be kept confidential. In order to maintain confidentiality, the need for authentication and encryption arises. Though this is not all that guarantees security on the organization’s network, but still the impleme...
8 Pages (2000 words) Coursework

Voting

...Voter Security Authentication for Online Voting... Voter Security Authentication for Online Voting... 20th October Voting Instructions: A Title Page Voting is a method to make a decision or to express an opinion, mostly follow by discussions, debates or election campaigns. It’s often saw in democracies and republics. A vote is a single act of voting, by which a person expresses support or predilection for a certain movement or a selection of candidates or a political party. There are different voting system uses for different types of voting like Plurality voting system, preferential voting system, approval voting system and range voting system. (Memidex) The main focus is on the language (sentence and words) of instructions and other messages ...
2 Pages (500 words) Research Paper

California Voter Online Registration

...Voter Security Authentication for Online Voting... Voter Security Authentication for Online Voting... California Voter Online Registration The of California has recently passed a law that allows its voters to register online. The Secretary of State Debra Bowen proudly announced that while most states are still unable to offer online voter registration, “I am thrilled to say the largest state in the nation is ready to roll” (Brown, n.p.). This is an initiative to replace the mailbox for Californians wanting to register. Nevertheless, online registration does not rid paper-based registration. They are also identical. The information entered by the prospective voter online will be checked carefully by the elections official before an applicant can...
1 Pages (250 words) Essay

Online Pizza Security

...Voter Security Authentication for Online Voting... Voter Security Authentication for Online Voting... Pizza Security What is Online Business Security? At the present, online security has become the biggest challenge for businesses. Before we start discussion on security issues related to online Pizza shop we should be familiar with security and privacy issues involved in online businesses. Security encompasses the principles, actions, and technical measures used to stop illegal access, modification, theft, and damage to personal information (Laudon & Laudon, 1999, p. 502). On the other hand, the term ‘Privacy’ refers to right of individuals and organizations to forbid or confine the compilation and utilizations of information about them (Shelly, ...
28 Pages (7000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Voter Security Authentication for Online Voting for FREE!

Contact Us