US Election Assistance Commission - Voluntary Voting System Guidelines Vote
EAC Home
Introduction
View Guidelines
View Comments
Glossary

View Comments

Section CommentsGeneral CommentsGlossary Comments
 
Name :   Stanley A. Klein
Organization :   N/A
Post Date :   9/30/2005

General Comments
Comment :  Appendix B
Threat Summary from IEEE P1583 Draft 5.3.2 (provided to EAC/TGDC)

Threats: The principal vulnerabilities to the voted secret ballot are (1) undetected compromise of
election integrity, (2) compromise of ballot secrecy, and (3) denial of voting service. All threats
to voting systems can be classified under one or more of these vulnerabilities.
a) Software Development, Testing, and Distribution phase
1) A programmer embeds a backdoor or other software in a COTS product known
to be potentially used in voting systems that enables malicious code to be later inserted into the voting system.