|

 
|
| | Name : | Stanley A. Klein | Organization : | N/A | Post Date : | 9/30/2005 |
| Comment : | Threats: ... All threats
to voting systems can be classified under one or more of these vulnerabilities.
b) InterElection
Maintenance phase
1) An insider (election official or voting system technician) inserts malicious
code into the software having an effect similar to that identified in a2.
2) Someone who has illegally gained access to the voting systems (who is not an insider) modifies the devices. (This could also be true at any of the other points, but is most likely to happen during the months between elections where
controlled access to the systems may be lax.)
| |
|
|