|

 
|
| | Name : | David Mertz, et al. | Organization : | N/A | Post Date : | 9/27/2005 |
| Glossary Term : | Trojan Horse | Definition : | | Comment : | Hidden content within a system or its software, usually associated with the execution of undocumented or surreptitious functions. In a voting context, it is a piece of software intended (a) to alter, or to permit the alteration of, the outcome of any election; or (b) to release, or to permit the release of, non-public data concerning an election to a person not authorized to receive it. A Trojan Horse may alter the outcome of an election by modifying the presentation of information to the voter; by changing, adding, or deleting votes; by making it difficult or impossible to vote; or by any other means tending to achieve the desired outcome. A Trojan Horse may release non-public information concerning an election via networks, wireless devices, encoded printouts, or otherwise. See also Covert Channel, Security Analysis. Association: Security | |
|
|