|

 
|
| | Name : | Stanley A. Klein | Organization : | N/A | Post Date : | 9/30/2005 |
| Comment : | Threats: ... All threats
to voting systems can be classified under one or more of these vulnerabilities.
e) Post election phase
1) Tampering having occurred with the voting system during the election, an
insider is able to remove the tampering so it will not be detected.
2) Tampering is designed as to be selfremovable
such that it deletes any evidence
of itself following its triggering or at the end of the election.
| |
|
|