尊敬的 微信汇率:1円 ≈ 0.046089 元 支付宝汇率:1円 ≈ 0.04618元 [退出登录]
SlideShare a Scribd company logo
Data and Network Security Report
Madlena Pavlova
1
Rights to vote is consider to be the major victory of the
democratic society.
Voting is an essential feature of the democracy.
Count our votes completely depends on the computer system,
which provide an opportunity of fraud.
Despite the fact that we are living in years of “cutting edge”
technologies, when it comes to Security in Voting system,
there is still much to be desired .
The goal of the coursework is to provide sound understanding
of how computer security is critical to the election process in
broadly applicable sense and what we need to do to keep the
election secure.
2
Security of term of adversarial problem is the core of
mindset. In fact we analyzed computer security study of
how the system behaves in a presence of adversary.
How to thinks as Attacker
 Looking for weakest links in the system.
 Identifying the assumptions that security system depends
on.
 Thinking outside the box – not constrained by system
designer‘s worldview.
3
Thinking as a Defender
Defending system requires cultivating view as:
Technical aspects
 Security policy (civil aspects of the system) we try to enforce.
 What we are going to protect and what are the assets we trying to
insure and prevent?
 What property we trying to enforce?
Treat models
 Who are the attackers? Capability? Motivations?
 What kind of attack we are trying to prevent?
Risk assessment
 What is the weakness of the system?
 What will successfully attacks cost us?
 How likely?
4
Adapting security Mindset is a pre- setup requirement before even
start thinking of any secure system.
 Integrity – the outcome of the election matches the actual voting.
 Voting intent – the vote is cast in the exact way as it was made.
 Votes are counted as cast.
There are room of errors in both cases (technical and less technical
requirements).Well design election system has to comply with:
 secrecy
 authentications
 enfranchisement and availability
 tension in the system
 cost effectiveness
 accessibility
 Intelligibility (usability)
5
 Matching state database with federal database can be
difficult due to its format.
 Most states prohibit people, convicted of serious
crimes in further elections. This creates potential
issues as many people with same name can enter the
prohibited list and wouldn’t know until they arrived on
the Election Day.
6
 Collected information as name, address, signature,
date of birth, telephone number, gender and ID
number stored in this massive database raised up the
question of who can access this data.
 Other problem is that those fields are publicly
available and can usually be obtained and purchased
from the state website.
 In many states the voter registration list is also used
to select people for jury duty which creates a trade-off
because people who try to avoid jury duty will also
avoid voter registration.
7
 Another issue is that voting database is available to
parties and they can used it for campaign purposes
as one example is Obama’s campaign:
” Is Your Neighbor a Democrat?” by encouraging
volunteers to go out and campaign to registered
Democrats.
 Commercial reuse of the data is another privacy
issues as companies can combine the voter’s
personal information for their business & marketing
purpose for example: home mortgage, credit card
debt etc.
8
9
In order to log into the Washington D.C.
online registration system, we need the name
and date of birth of the voter.
10
Date of birth is one of those fields collected during the voter registration
process and publicly available. By simple searching we can easily
discover voter registration record with voter's date of birth and other
relevant information. Having this in hand we can easily log on and
accessed to voter registration home page .
As the attacker's target is to misdirect the ballot, he will try
to update the voter’s address and will be asked for
Driving License number which also is not a piece of secret
information and can be easily retrieved .
11
 This kind of attack is pretty scary especially in state
where voters participated in the election process
entirely by mail as we can imagine consequences of
wide scale attack where someone tried to automate this
process and change the voter’s registration information
automatically through large numbers of people right
before the deadline for mailing out those ballots.
 Solution : One way that the state could protect against
that would be to mail out confirmation before changing
your address for example sending a card to the old and
the new address saying that the address has being
modified in the database. Washington State has not
implemented a protection like this but it seems like a
key part of the validation process in order to maintain
the integrity of the registration system.
12
13
For many years, Diebold - the makers of the
AccuVote TS was extremely secretive about
allowing anyone to do an independent security
evaluation of their machines or the software
running in them. Diebold even threaten election
officials who proposed to have their independent
security evaluation done.
14
All of that started to change in 2003, when
a voting activist named Bev Harris was
Google in for documents about the Diebold
machines and came across with a file
posted to a Diebold Internet server. This
file happened to be a copy of the complete
source code to the Diebold voting
machine.
15
16
It’s turned out that they applied encryption incorrectly in a variety of
ways because of design errors. The most interesting of these errors,
the simplest one, was that all of the voting machines used exactly the
same encryption key – a terrible security practice ,because the criminal
can take that information and apply it to break the encryption on all of
the other Diebold voting machines in use nationwide. That key is
happened to be the string F2654hD4. That was the secret that was
protecting the integrity on all of these machines and once the code
leaked to the Diebold website anyone could decrypt any of the data
files from any of the machines.
The next problem was a ballot secrecy problem. It
had to do with the way ballots were stored on the
memory card. The machine made a record of every
time someone cast a vote; the votes were stored in a
file on the memory card. In the Diebold memory card
the votes were stored in order. If someone was just
observing at the polling place, watching the order in
which people went into the machine and cast their
votes and they had access to the memory card at
the end, they could determine exactly how every one
of those voters voted which is a major weakness in
ballot secrecy.
17
18
Finally, the researchers looked at the software
development practice. The easiest way to
illustrate what it is mean by that is to have a look
at the some of the comments that were found in
the code comments and notes programmers
leaved inside the software source code .
All of these problems painted a pretty grim
picture of what's going on inside the Diebold
DREs, but the company's reaction paints an
even grimmer one.
 First- denied the problems.
 Secondary - claimed that the software that was
studied was not something used in actual
machines.
 Third- personally attacked the researchers
involved.
19
20
Every group that's had a look at the system has found
even more severe problems with security and
reliability. Here is an example of one of those
problems.
Many researchers’ opinion is that in order to
have voting security community, we have to add
paper as a form of defense. Paper can offer very
important security advantages, especially when
it's coupled with electronic system and makes
sense as computers are not always available,
reliable and correct, therefore any form of
physical backup of the votes’ records can be
useful disaster recovery strategy.
21

More Related Content

What's hot

Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104
Hai Nguyen
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
ppd1961
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
Aviva Spectrum™
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
IJCNCJournal
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
Jim Brashear
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
Smartphones are smarter than you thought geo bellas
Smartphones are smarter than you thought   geo bellasSmartphones are smarter than you thought   geo bellas
Smartphones are smarter than you thought geo bellas
GeoBellas
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber Liability
Rachel Hamilton
 
Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus Presentation
Graeme McGowan
 
benfords Law
benfords Lawbenfords Law
benfords Law
Mark Luciani
 
Cyber law
Cyber lawCyber law
Cyber law
abiabel
 
Cybertorts
CybertortsCybertorts
Cybertorts
panabaha
 
Cybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. InternetCybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. Internet
Prof. (Dr.) Tabrez Ahmad
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
Mayank Diwakar
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
BPalmer13
 
HiQ v Linkedin
HiQ v LinkedinHiQ v Linkedin
HiQ v Linkedin
Matt Charney
 
Analysis the attack and E-commerce security
Analysis the attack and E-commerce securityAnalysis the attack and E-commerce security
Analysis the attack and E-commerce security
Army Institute Of Business Administration,Savar
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
Harsh Kumar
 
FTC Balances Privacy, Connectivity Needs
FTC Balances Privacy, Connectivity NeedsFTC Balances Privacy, Connectivity Needs
FTC Balances Privacy, Connectivity Needs
Patton Boggs LLP
 

What's hot (19)

Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Smartphones are smarter than you thought geo bellas
Smartphones are smarter than you thought   geo bellasSmartphones are smarter than you thought   geo bellas
Smartphones are smarter than you thought geo bellas
 
The Changing Landscape of Cyber Liability
The Changing Landscape of Cyber LiabilityThe Changing Landscape of Cyber Liability
The Changing Landscape of Cyber Liability
 
Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus Presentation
 
benfords Law
benfords Lawbenfords Law
benfords Law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cybertorts
CybertortsCybertorts
Cybertorts
 
Cybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. InternetCybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. Internet
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
HiQ v Linkedin
HiQ v LinkedinHiQ v Linkedin
HiQ v Linkedin
 
Analysis the attack and E-commerce security
Analysis the attack and E-commerce securityAnalysis the attack and E-commerce security
Analysis the attack and E-commerce security
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
FTC Balances Privacy, Connectivity Needs
FTC Balances Privacy, Connectivity NeedsFTC Balances Privacy, Connectivity Needs
FTC Balances Privacy, Connectivity Needs
 

Viewers also liked

HOW TO TRACK SOMEONES WHATSAPP CONVERSATIONS
HOW TO TRACK SOMEONES WHATSAPP CONVERSATIONSHOW TO TRACK SOMEONES WHATSAPP CONVERSATIONS
HOW TO TRACK SOMEONES WHATSAPP CONVERSATIONS
Barbara_Shetty
 
Chuyên
ChuyênChuyên
Chuyên
mayvanphong8x
 
Presentación
PresentaciónPresentación
Presentación
Judith Rasnosky
 
Evidence of Research Support Services in Australian Academic Libraries
Evidence of Research Support Services in Australian Academic LibrariesEvidence of Research Support Services in Australian Academic Libraries
Evidence of Research Support Services in Australian Academic Libraries
SusanMRob
 
Resume 2014 x3
Resume 2014 x3Resume 2014 x3
Resume 2014 x3
Roberta Lara
 
ORCID: Today and the Future
ORCID: Today and the FutureORCID: Today and the Future
ORCID: Today and the Future
SusanMRob
 
HOW TO CHECK IF SOMEONE DELETED WHATSAPP
HOW TO CHECK IF SOMEONE DELETED WHATSAPP HOW TO CHECK IF SOMEONE DELETED WHATSAPP
HOW TO CHECK IF SOMEONE DELETED WHATSAPP
Barbara_Shetty
 
Infografia
InfografiaInfografia

Viewers also liked (8)

HOW TO TRACK SOMEONES WHATSAPP CONVERSATIONS
HOW TO TRACK SOMEONES WHATSAPP CONVERSATIONSHOW TO TRACK SOMEONES WHATSAPP CONVERSATIONS
HOW TO TRACK SOMEONES WHATSAPP CONVERSATIONS
 
Chuyên
ChuyênChuyên
Chuyên
 
Presentación
PresentaciónPresentación
Presentación
 
Evidence of Research Support Services in Australian Academic Libraries
Evidence of Research Support Services in Australian Academic LibrariesEvidence of Research Support Services in Australian Academic Libraries
Evidence of Research Support Services in Australian Academic Libraries
 
Resume 2014 x3
Resume 2014 x3Resume 2014 x3
Resume 2014 x3
 
ORCID: Today and the Future
ORCID: Today and the FutureORCID: Today and the Future
ORCID: Today and the Future
 
HOW TO CHECK IF SOMEONE DELETED WHATSAPP
HOW TO CHECK IF SOMEONE DELETED WHATSAPP HOW TO CHECK IF SOMEONE DELETED WHATSAPP
HOW TO CHECK IF SOMEONE DELETED WHATSAPP
 
Infografia
InfografiaInfografia
Infografia
 

Similar to Security in digital voting system

SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
aryan532920
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
Adeel Javaid
 
India Legal 17 June 2019
India Legal 17 June 2019India Legal 17 June 2019
India Legal 17 June 2019
ENC
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
John Intindolo
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
IRJET Journal
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
Salaj Goyal
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Binit Kumar
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
Regula
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Madlena pavlova security_in__digital_voting_system
Madlena pavlova security_in__digital_voting_systemMadlena pavlova security_in__digital_voting_system
Madlena pavlova security_in__digital_voting_system
Madlena Pavlova
 
DEF CON 27 - Voting village - report defcon27 hires
DEF CON 27 - Voting village - report defcon27 hiresDEF CON 27 - Voting village - report defcon27 hires
DEF CON 27 - Voting village - report defcon27 hires
Felipe Prado
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
Bradley Buchanan
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
essay-writing-help.us
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
Lisa Olive
 
Congressional Research Service ˜ The Library of CongressCR.docx
Congressional Research Service ˜ The Library of CongressCR.docxCongressional Research Service ˜ The Library of CongressCR.docx
Congressional Research Service ˜ The Library of CongressCR.docx
donnajames55
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
Casey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Casey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
bugcrowd
 
AIDA ICITET
AIDA ICITETAIDA ICITET

Similar to Security in digital voting system (19)

SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
 
India Legal 17 June 2019
India Legal 17 June 2019India Legal 17 June 2019
India Legal 17 June 2019
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Madlena pavlova security_in__digital_voting_system
Madlena pavlova security_in__digital_voting_systemMadlena pavlova security_in__digital_voting_system
Madlena pavlova security_in__digital_voting_system
 
DEF CON 27 - Voting village - report defcon27 hires
DEF CON 27 - Voting village - report defcon27 hiresDEF CON 27 - Voting village - report defcon27 hires
DEF CON 27 - Voting village - report defcon27 hires
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Congressional Research Service ˜ The Library of CongressCR.docx
Congressional Research Service ˜ The Library of CongressCR.docxCongressional Research Service ˜ The Library of CongressCR.docx
Congressional Research Service ˜ The Library of CongressCR.docx
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
AIDA ICITET
AIDA ICITETAIDA ICITET
AIDA ICITET
 

Recently uploaded

Getting Started Using the National Research Platform
Getting Started Using the National Research PlatformGetting Started Using the National Research Platform
Getting Started Using the National Research Platform
Larry Smarr
 
ScyllaDB Topology on Raft: An Inside Look
ScyllaDB Topology on Raft: An Inside LookScyllaDB Topology on Raft: An Inside Look
ScyllaDB Topology on Raft: An Inside Look
ScyllaDB
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes
 
Product Listing Optimization Presentation - Gay De La Cruz.pdf
Product Listing Optimization Presentation - Gay De La Cruz.pdfProduct Listing Optimization Presentation - Gay De La Cruz.pdf
Product Listing Optimization Presentation - Gay De La Cruz.pdf
gaydlc2513
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
ScyllaDB
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
ScyllaDB
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
ScyllaDB
 
Database Management Myths for Developers
Database Management Myths for DevelopersDatabase Management Myths for Developers
Database Management Myths for Developers
John Sterrett
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
UmmeSalmaM1
 
An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
Safe Software
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
NTTDATA INTRAMART
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
Neeraj Kumar Singh
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
Kieran Kunhya
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
ThousandEyes
 

Recently uploaded (20)

Getting Started Using the National Research Platform
Getting Started Using the National Research PlatformGetting Started Using the National Research Platform
Getting Started Using the National Research Platform
 
ScyllaDB Topology on Raft: An Inside Look
ScyllaDB Topology on Raft: An Inside LookScyllaDB Topology on Raft: An Inside Look
ScyllaDB Topology on Raft: An Inside Look
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
 
Product Listing Optimization Presentation - Gay De La Cruz.pdf
Product Listing Optimization Presentation - Gay De La Cruz.pdfProduct Listing Optimization Presentation - Gay De La Cruz.pdf
Product Listing Optimization Presentation - Gay De La Cruz.pdf
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
 
Database Management Myths for Developers
Database Management Myths for DevelopersDatabase Management Myths for Developers
Database Management Myths for Developers
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
 
An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
 

Security in digital voting system

  • 1. Data and Network Security Report Madlena Pavlova 1
  • 2. Rights to vote is consider to be the major victory of the democratic society. Voting is an essential feature of the democracy. Count our votes completely depends on the computer system, which provide an opportunity of fraud. Despite the fact that we are living in years of “cutting edge” technologies, when it comes to Security in Voting system, there is still much to be desired . The goal of the coursework is to provide sound understanding of how computer security is critical to the election process in broadly applicable sense and what we need to do to keep the election secure. 2
  • 3. Security of term of adversarial problem is the core of mindset. In fact we analyzed computer security study of how the system behaves in a presence of adversary. How to thinks as Attacker  Looking for weakest links in the system.  Identifying the assumptions that security system depends on.  Thinking outside the box – not constrained by system designer‘s worldview. 3
  • 4. Thinking as a Defender Defending system requires cultivating view as: Technical aspects  Security policy (civil aspects of the system) we try to enforce.  What we are going to protect and what are the assets we trying to insure and prevent?  What property we trying to enforce? Treat models  Who are the attackers? Capability? Motivations?  What kind of attack we are trying to prevent? Risk assessment  What is the weakness of the system?  What will successfully attacks cost us?  How likely? 4
  • 5. Adapting security Mindset is a pre- setup requirement before even start thinking of any secure system.  Integrity – the outcome of the election matches the actual voting.  Voting intent – the vote is cast in the exact way as it was made.  Votes are counted as cast. There are room of errors in both cases (technical and less technical requirements).Well design election system has to comply with:  secrecy  authentications  enfranchisement and availability  tension in the system  cost effectiveness  accessibility  Intelligibility (usability) 5
  • 6.  Matching state database with federal database can be difficult due to its format.  Most states prohibit people, convicted of serious crimes in further elections. This creates potential issues as many people with same name can enter the prohibited list and wouldn’t know until they arrived on the Election Day. 6
  • 7.  Collected information as name, address, signature, date of birth, telephone number, gender and ID number stored in this massive database raised up the question of who can access this data.  Other problem is that those fields are publicly available and can usually be obtained and purchased from the state website.  In many states the voter registration list is also used to select people for jury duty which creates a trade-off because people who try to avoid jury duty will also avoid voter registration. 7
  • 8.  Another issue is that voting database is available to parties and they can used it for campaign purposes as one example is Obama’s campaign: ” Is Your Neighbor a Democrat?” by encouraging volunteers to go out and campaign to registered Democrats.  Commercial reuse of the data is another privacy issues as companies can combine the voter’s personal information for their business & marketing purpose for example: home mortgage, credit card debt etc. 8
  • 9. 9 In order to log into the Washington D.C. online registration system, we need the name and date of birth of the voter.
  • 10. 10 Date of birth is one of those fields collected during the voter registration process and publicly available. By simple searching we can easily discover voter registration record with voter's date of birth and other relevant information. Having this in hand we can easily log on and accessed to voter registration home page .
  • 11. As the attacker's target is to misdirect the ballot, he will try to update the voter’s address and will be asked for Driving License number which also is not a piece of secret information and can be easily retrieved . 11
  • 12.  This kind of attack is pretty scary especially in state where voters participated in the election process entirely by mail as we can imagine consequences of wide scale attack where someone tried to automate this process and change the voter’s registration information automatically through large numbers of people right before the deadline for mailing out those ballots.  Solution : One way that the state could protect against that would be to mail out confirmation before changing your address for example sending a card to the old and the new address saying that the address has being modified in the database. Washington State has not implemented a protection like this but it seems like a key part of the validation process in order to maintain the integrity of the registration system. 12
  • 13. 13
  • 14. For many years, Diebold - the makers of the AccuVote TS was extremely secretive about allowing anyone to do an independent security evaluation of their machines or the software running in them. Diebold even threaten election officials who proposed to have their independent security evaluation done. 14
  • 15. All of that started to change in 2003, when a voting activist named Bev Harris was Google in for documents about the Diebold machines and came across with a file posted to a Diebold Internet server. This file happened to be a copy of the complete source code to the Diebold voting machine. 15
  • 16. 16 It’s turned out that they applied encryption incorrectly in a variety of ways because of design errors. The most interesting of these errors, the simplest one, was that all of the voting machines used exactly the same encryption key – a terrible security practice ,because the criminal can take that information and apply it to break the encryption on all of the other Diebold voting machines in use nationwide. That key is happened to be the string F2654hD4. That was the secret that was protecting the integrity on all of these machines and once the code leaked to the Diebold website anyone could decrypt any of the data files from any of the machines.
  • 17. The next problem was a ballot secrecy problem. It had to do with the way ballots were stored on the memory card. The machine made a record of every time someone cast a vote; the votes were stored in a file on the memory card. In the Diebold memory card the votes were stored in order. If someone was just observing at the polling place, watching the order in which people went into the machine and cast their votes and they had access to the memory card at the end, they could determine exactly how every one of those voters voted which is a major weakness in ballot secrecy. 17
  • 18. 18 Finally, the researchers looked at the software development practice. The easiest way to illustrate what it is mean by that is to have a look at the some of the comments that were found in the code comments and notes programmers leaved inside the software source code .
  • 19. All of these problems painted a pretty grim picture of what's going on inside the Diebold DREs, but the company's reaction paints an even grimmer one.  First- denied the problems.  Secondary - claimed that the software that was studied was not something used in actual machines.  Third- personally attacked the researchers involved. 19
  • 20. 20 Every group that's had a look at the system has found even more severe problems with security and reliability. Here is an example of one of those problems.
  • 21. Many researchers’ opinion is that in order to have voting security community, we have to add paper as a form of defense. Paper can offer very important security advantages, especially when it's coupled with electronic system and makes sense as computers are not always available, reliable and correct, therefore any form of physical backup of the votes’ records can be useful disaster recovery strategy. 21
  翻译: