US Election Assistance Commission - Voluntary Voting System Guidelines Vote
EAC Home
Introduction
View Guidelines
View Comments
Glossary

View Comments

Section CommentsGeneral CommentsGlossary Comments
 
Name :   Stanley A. Klein
Organization :   N/A
Post Date :   9/30/2005

General Comments
Comment :  Threats: ... All threats
to voting systems can be classified under one or more of these vulnerabilities.

3) A vulnerability or other nondeliberate
error in the development of a COTS
product potentially used in voting systems enables malicious code or erroneous
data to be later inserted into the voting system.
4) A vulnerability or other nondeliberate
error in the development of a voting
system has an effect similar to that identified in a2.
5) Some systems are manufactured as to be subtly different from others such that
malicious modifications can be made or deployed more easily.