|

 
|
| | Name : | Stanley A. Klein | Organization : | N/A | Post Date : | 9/30/2005 |
| Comment : | Appendix B
Threat Summary from IEEE P1583 Draft 5.3.2 (provided to EAC/TGDC)
Threats: The principal vulnerabilities to the voted secret ballot are (1) undetected compromise of
election integrity, (2) compromise of ballot secrecy, and (3) denial of voting service. All threats
to voting systems can be classified under one or more of these vulnerabilities.
a) Software Development, Testing, and Distribution phase
1) A programmer embeds a backdoor or other software in a COTS product known
to be potentially used in voting systems that enables malicious code to be later inserted into the voting system.
| |
|
|