|

 
|
| | Name : | Stanley A. Klein | Organization : | N/A | Post Date : | 9/30/2005 |
| Comment : | Threats: ... All threats
to voting systems can be classified under one or more of these vulnerabilities.
c) Election Setup phase
1) An insider inserts code into the software and/or data into the election setup that
causes item (a) of a2
to be part of the election setup or to be introduced later
and allows the remaining items of a2
to be performed later. | |
|
|