Good Course Work About Computer Security: A Program To Accept And Evaluate Election Results

Published: 2021-07-06 00:50:05
essay essay

Category: Information, Politics, Vehicles, Elections, Voting, Cyber Crimes, Machine, Glitches

Type of paper: Essay

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

GET MY ESSAY
A Direct Recording Electronic (DRE) voting machine, introduced in the US in 2004 general elections, is capable of recording votes through a ballot display. The ballot has mechanical or electro-optical components that are activated by the voter during the voting via touch screen. DRE is also capable of processing data by means of a computer program and after the election; it produces a tabulation of voting data in the form of a printed report.
DRE has been presented as a safe, reliable and easy-to-use voting and tabulation device which can process votes much faster than normal physical count. However, the program is also vulnerable to a wide range of hacking and tampering attempts. Some of the potential hackers and their intent are listed below:

- Political parties: Like every other machine, DRE contains glitches and is susceptible to hacking and breakdowns. These glitches can be used by rival political groups to ensure their candidates success in the elections by adding votes to them, despite the ruling of the majority in favor of another candidate. A classic case of the vote “flipping” during the election serves as an example. .

- Hackers: Using DDOS attacks and polymorphic virus, hackers can creep into the system and leak election results online, before the tabulation process is complete. While some hackers might do it for fun, others may have sinister plans, such as creating panic among people or making them distrust democracy and state.

- Poll Workers/Election Officials: These people possess knowledge of the system and have access to the mainframe. They can easily override controls and tamper with the number of votes before a formal tabulation is conducted. Experts are of the opinion that if the system is tampered, the fraudulent program or malware may remain undetected. .

Works Cited

Clayton, M. (2012, November 7). Voting-machine glitches: How bad was it on Election Day around the country? Retrieved from The Christian Science Monitor: http://www.csmonitor.com/USA/Elections/2012/1107/Voting-machine-glitches-How-bad-was-it-on-Election-Day-around-the-country
Fischer, E. A., & Coleman, K. J. (2005). The Direct Recording Electronic Voting Machine. The Library of Congress. Retrieved from http://fpc.state.gov/documents/organization/60725.pdf

Warning! This essay is not original. Get 100% unique essay within 45 seconds!

GET UNIQUE ESSAY

We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read