StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

(DRE) voting systems - Book Report/Review Example

Cite this document
Summary
With the advancement of technology the voting system is now revolutionized by the adoption of electronic voting systems in the U.S. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
(DRE) voting systems
Read Text Preview

Extract of sample "(DRE) voting systems"

With the advancement of technology the voting system is now revolutionized by the adoption of electronic voting systems in the U.S. Despite this fast paced adoption of “direct recording electronic” (DRE) voting systems and the advantages it poses in terms of efficiency and convenience it comprises of several disadvantages such as the possibility of the presence of security relevant flaws that make the system susceptible to exploitation by unscrupulous voters or by malicious insiders. The certification of these DRE Systems is implemented without any through security checks which further compromises its integrity a fact that is further strengthened due to the absence of cryptographic techniques and the poor general software engineering quality of its construction.

An analysis of the AccuVote-TS version 4, tree in the CVS repository one of Diebold’s voting systems which are in use in 37 states, and are the second largest and the fastest growing vendor of electronic voting machines, show significant and wide-reaching security vulnerabilities so much that voters can easily program their own smartcards to simulate the behavior of valid smartcards used in the elections. The device running the vote collection, also known as, the Diebold voting terminal, the ballot definition and voter cards, key parts of the election process are all susceptible to manipulation by measures such as exploiting the lack of cryptography, reverse engineering smartcard protocol, casting multiple votes by the use of several active smart cards and circumventing the administrator pin.

If those prevalent flaws weren’t enough election configuration and election data are prone to considerable problems. These were in shape of two main vectors for accessing and attacking the voting system’s data; first by physical access to the device storing the data and second via man-in-the-middle attacks as the data is transported over some network. Other area’s that are prove to be vulnerable are the system configuration, ballot definitions, impersonation of legitimate voting terminals and that of audit logs.

The article astounds me as far as the existence of numerous vulnerabilities that compromise the electronic voting system are concerned. Perhaps the digital age with its advancement, convenience and speed have come at a cost. That cost being that of the existence of new methods of manipulation and exploitation of voting practices. This voting system in all agreement is highly unsuitable for the use in a general election. In such a case it would be most appropriate to use a voter-verifiable audit trail’ as the article suggests mostly because it allows verification as the computerized voting system prints out a paper ballot that can be read and confirmed by the voter.

Reference Kohno.T., Stubblefied.A., Rubin.A, Wallach.D. (2004). Analysis of an electronic voting system. IEEE Symposium on Security and Privacy. 1081-6011/0.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“(DRE) voting systems Book Report/Review Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/technology/1576996-dre-voting-systems
((DRE) Voting Systems Book Report/Review Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/technology/1576996-dre-voting-systems.
“(DRE) Voting Systems Book Report/Review Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/technology/1576996-dre-voting-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF (DRE) voting systems

Security in Electronic Voting Systems

The paper "Security in Electronic voting systems" deals with voting systems in universities for teaching and voting.... Electronic voting systems seek to reduce time consumption during any type of voting and increase participation.... nbsp; Though electronic voting systems are highly efficient and accurate, the security of the systems is of high concern.... lectronic voting systems must be efficiently designed to maintain high confidence levels and integrity in order to eliminate voter manipulation, and the manipulation of the electronic voting at large (Liaw, p 115)....
7 Pages (1750 words) Case Study

The Process of Voting

The paper "voting" tells us about National Presidential Election.... nbsp;Coffee and water cups are filled as co-workers expand on their latest reasons for not voting.... hellip; Americans have more opportunities to vote then any other country in the world, and the impact of voting is felt in every aspect of American life.... From the beginning of American history, it has been proven that voting is important.... History highlights the importance of voting and the terrible conditions that occur when this right does not exist or is suppressed....
7 Pages (1750 words) Essay

Types of Voting Systems

The paper "voting systems" tells us about three kinds of voting system: plurality/majority system, proportional representation system, and semi proportional system.... Other voting systems may become very complex for people to understand.... nbsp;All these three division of voting system somehow relate to each other and more likely to bring the same political results.... hellip; Plurality or majority system is the most frequently used voting system....
8 Pages (2000 words) Essay

Voting Systems in the United Kingdom

hellip; So, we can say that the major difference in the voting system occurs among the three voting systems, and not within them.... Some of the details and description of three kinds of voting systems which are given below will help us in understanding the phenomenon of each voting system.... The first two are commonly used plurality system of voting, while the other two are majority systems.... This essay describes types of the voting system there are generally three: plurality/majority system, proportional representation system, and semi-proportional system....
8 Pages (2000 words) Essay

The Key Benefits and Drawbacks of ICD-10 Coding System

The World Health Organization (WHO) created this system of coding in order to facilitate proper medical records of diseases, symptoms, different types of injuries, as well as emerging diseases from… Prior to the development of ICD-10, many countries had been using ICD-9.... The concept of ICD-10 first emerged in 1990 and the full development took place in 1994 releasing a coding system that could replace ICD-9....
9 Pages (2250 words) Assignment

Voter Security Authentication for Online Voting

Responsible teams in the development and deployment of internet voting must have superior systems.... On the other hand, information systems technology experts have raised questions on related e-voting security issues.... The paper "Voter Security Authentication for Online voting" states that the voting system requires continuous auditing, multi-prolonged testing for development stages in implementation phases.... This is important for the voting system before, during and after the voting system....
7 Pages (1750 words) Essay

Use of Biometric Technologies for E-Voting

The first part identifies two biometric methods used in e-Voting; the second section describes security issues in regard to e-voting systems and finally assesses the inherent vulnerabilities associated with SSL and RSA.... So far, conventional voting systems locked out many people from participating fully in voting.... Similar systems include palm prints or hand geometry.... … The paper "Use of Biometric Technologies for E-voting" is a great example of a report on design and technology....
6 Pages (1500 words) Report

Biometric for E-voting in the UK

he use of DNA systems and other biometric systems have their own vulnerabilities.... b) Public support for biometric enabled eVoting The biometric systems often used in e-voting have a great influence on the public opinion towards e-voting.... … 1a) Biometric for e-voting in the UKBiometric identification involves identifying individuals by their human characteristics as opposed to other modern methods of identification such as passwords, identification cards, passports etc....
6 Pages (1500 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us