Security Requirements for Internet Voting Systems. Outline

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Security Requirements for Internet Voting Systems. Outline"

Transcription

1 Security Requirements for Internet Voting Systems Presented By: Ed Rodriguez ACSAC 01 December 13, , Booz Allen & Hamilton Inc. Outline What is Internet Voting? Why is Internet Voting Different? Unique Internet Voting Security Considerations Framework to Develop Security Requirements Discussion of Internet Voting Security Attributes Observations & Final Words Page 2 1

2 What is Internet Voting? Internet Voting is the act of casting a vote using a system that employs internet based protocols. Currently there are two flavors: Poll site internet voting Remote internet voting Page 3 Poll Site Internet Voting ATM Like Kiosks Intranet Election Processing Server Tabulation Server Poll Site Workstations With Touch Screens Host Center Servers (HCS) LEOs Using Workstation At County Level Intranet Under Local Election Office Control Page 4 2

3 Remote Internet Voting Under Local Election Office Control Internet Election Processing Server Tabulation Server Citizen Workstations Host Center Servers (HCS) LEOs Using Workstation At County Level Internet or Intranet At Home or Office Not Under Local Election Office Control Page 5 Community View Various reports have stated that poll site internet voting is feasible in the mid term while remote internet voting is not feasible we can t accept any risk at all there are new risks that don t exist in current systems If the two are architecturally very similar then why are there two vastly different views on this matter? Let s investigate further Page 6 3

4 Why is Internet Voting Different From Electronic Voting Connectivity via direct line at LEO facility Optical Scan Device at Precinct Local Results Tabulator Connectivity via direct dial-up line or air-gap Results Concentrator Direct Recording Device (DRE) Voting Devices Device at LEO facility Embedded Computer Devices - controlled HMI - special purpose computer architecture Devices under strict Local Election Office control Page 7 Why is Internet Voting Different From Electronic Voting Connectivity via the Internet Connectivity via Internet Internet Results Concentrator Device at LEO facility Voting Devices General Purpose Computer Devices - standard HMI (mouse, keyboard) - general purpose computer architecture Devices under configuration control of citizen Page 8 4

5 Why is Internet Voting Different From Electronic Voting The environment that Internet voting operates within creates unique security concerns Page 9 Unique Internet Voting Security Concerns Face-to-face authentication not possible Internet Intrusion Denial of Service Results Concentrator Voting Devices General Purpose Computer Devices - inadvertent incorrect use of equipment - nonexistent fault detection and fault tolerance capabilities Non-rigorous configuration management allows for higher risk of malicious software Page 10 5

6 Therefore, We Assert Internet Voting security requirements MUST accounts for environments with different sets of threats even though the system architectures are similar/identical! To date no clear view or articulation of security requirements has been made Current Revised FEC Voluntary Standards for Computer Based Election Systems (VSS) standards are first cut at this issue but being developed without broad industry participation (vendors or security community) Page 11 Development of Security Requirements Develop a notional concept of operations How would an Internet Voting System work from a user perspective? Identify the required security attributes for security-related objects and operations What security things do we have to worry about? Define security requirements categories? What is the high level set of security requirements? Page 12 6

7 Concept of Operation Discussion based on the Voting Over the Internet (VOI) model implemented and used during the 2000 General Election VOI s model was based on the absentee voting process California Internet Voting Task Force Report cited the absentee voting model as the most suitable for internet voting Page 13 Absentee Voting Process Vote the ballot Insert in Privacy Envelope Insert in Mailing Envelope & Sign Oath Verify Oath Signature Separate the Outer Envelope Remove ballot From Privacy Envelope Tabulate Page 14 7

8 VOI Voting Process Encrypt ballot Vote the using local html ballot election office public key Append to encrypted ballot the citizen s digital signature affirming oath Internet Verify digital signature Store object until ballot processing time At ballot processing, strip signature from object & randomize order Decrypt the ballots using Private Key retained by multiple parties Print & tabulate Page 15 Security Attributes Four Primary Security Services Provided Through the Use of Cryptography Registration Voting Data Integrity Identification & Authentication Non-repudiation Confidentiality Page 16 8

9 Security Attributes Data Integrity Identification & Authentication Availability Nonrepudiation Confidentiality Electronic Voting Non-cryptographic techniques used (CRC) Personal address (no proof reqd) Driver s license Equip uses best commercial practices w/ some reliability enhancements Limited (no proof of vote being counted) Citizen s choices are anonymous at entry time Remote Internet Voting Cryptographic techniques required (digital signatures) Identity digital certificate (w/ face-to-face validation) ed ID & password? COTS Equip Network DoS concerns Network availability Extensive logs Residual objects exist Encrypted e-ballot is unencrypted only by LEO Page 17 Observations & Final Thoughts Internet Voting provides opportunity to provide enhancements beyond current systems. Strong I&A (benefits extend to registration) Proof of Vote Does Internet Voting Demands Perfect Security? So Say the Experts Higher Standard or Pessimistic Viewpoint? Should Be Defined by Standards (FEC? IEEE?) Perfect Anything Is Unattainable Need for a Managed Risk Approach to Security Some Security Risks Remain Require active participation of security community to integrate security into stds! Page 18 9

10 Ed Rodriguez Page 19 10

PUBLIC REPORT. Red Team Testing of the ES&S Unity 3.0.1.1 Voting System. Freeman Craft McGregor Group (FCMG) Red Team

PUBLIC REPORT. Red Team Testing of the ES&S Unity 3.0.1.1 Voting System. Freeman Craft McGregor Group (FCMG) Red Team PUBLIC REPORT Red Team Testing of the Voting System Freeman Craft McGregor Group (FCMG) Red Team Prepared for the California Secretary of State by: Jacob D. Stauffer, FCMG Red Team Project Manager Page

More information

Secure Electronic Voting

Secure Electronic Voting 7 th Computer Security Incidents Response Teams Workshop Syros,, Greece, September 2002 Secure Electronic Voting New trends, new threats... Prof.. Dr. Dimitris Gritzalis Dept. of Informatics Athens University

More information

Internet voting feasibility study

Internet voting feasibility study Internet voting feasibility study A summary Table of contents Introduction... 2 System functionality... 3 System requirements... 5 Information security... 6 Additional requirements concerning information

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Internet voting solution

Internet voting solution i-vote: heart of e-democracy Internet voting i-voting allows voters to participate in an election over the Internet using their PC or notebook. i-voting is used as an additional voting method to better

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

SUNSET PARK OF SUNNYVALE HOMEOWNERS ASSOCIATION ELECTION RULES

SUNSET PARK OF SUNNYVALE HOMEOWNERS ASSOCIATION ELECTION RULES SUNSET PARK OF SUNNYVALE HOMEOWNERS ASSOCIATION ELECTION RULES Whereas, California Civil Code Section 1363.03(a), with effective date of July 1, 2006, requires the adoption of rules regarding Election

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Software Review and Security Analysis of Scytl Remote Voting Software. Michael Clarkson Brian Hay Meador Inge abhi shelat David Wagner Alec Yasinsac

Software Review and Security Analysis of Scytl Remote Voting Software. Michael Clarkson Brian Hay Meador Inge abhi shelat David Wagner Alec Yasinsac Software Review and Security Analysis of Scytl Remote Voting Software Michael Clarkson Brian Hay Meador Inge abhi shelat David Wagner Alec Yasinsac September 19, 2008 Contents 1 Executive Summary 3 2 Team

More information

Information Security

Information Security Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 vedatcoskun@isikun.edu.tr www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked

More information

E-Democracy and e-voting

E-Democracy and e-voting E-Democracy and e-voting How to make them secure and transparent August 2013 Jordi Puiggali CSO and SVP R&D Jordi.puiggali@scytl.com Index Introduction e-democracy Security and Transparency in e-voting

More information

EAC Decision on Request for Interpretation 2008-03 (Operating System Configuration)

EAC Decision on Request for Interpretation 2008-03 (Operating System Configuration) EAC Decision on Request for Interpretation 2008-03 (Operating System Configuration) 2002 VSS Volume1: 2.2.5.3, 4.1.1, 6.2.1.1, Volume2: 3.5 2005 VVSG Volume1: 2.1.5.2, 5.1.1, 7.2.1, Volume2: 3.5 Date:

More information

Online Voting Project. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles.

Online Voting Project. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles. Introduction. Since 2001 T-Systems made research on secure online voting systems

More information

Chapter 6 Electronic Mail Security

Chapter 6 Electronic Mail Security Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,

More information

Susan C. McCool. Precinct Summary Voter Turnout Analysis for 2012 Primary Election Aug/14/2012

Susan C. McCool. Precinct Summary Voter Turnout Analysis for 2012 Primary Election Aug/14/2012 1 Voted at Polls 195 119 63 8 5 132 6 2 1 9 12 3 Absentee Voted 42 21 19 1 1 39 3 16 26 Early Voted 9 57 28 5 63 25 1 1 39 5 1 836 483 232 98 23 56 276 28 26 365 46 % Turnout 39.1% 4.8% 47.4% 14.3% 26.1%

More information

Department of Defense Washington Headquarters Services Federal Voting Assistance Program. Voting Over the Internet Pilot Project Assessment Report

Department of Defense Washington Headquarters Services Federal Voting Assistance Program. Voting Over the Internet Pilot Project Assessment Report Department of Defense Washington Headquarters Services Federal Voting Assistance Program Voting Over the Internet Pilot Project Assessment Report June 2001 FEDERAL VOTING ASSISTANCE PROGRAM DEPARTMENT

More information

Glossary Revised 9/1/11

Glossary Revised 9/1/11 Revised 9/1/11 This glossary is a collection of terms commonly used in the administration of elections. Acknowledgement notice A term originally used by the Federal Election Commission (now the Election

More information

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential

More information

Colorado Secretary of State Election Rules [8 CCR 1505-1]

Colorado Secretary of State Election Rules [8 CCR 1505-1] Rule 7. Elections Conducted by the County Clerk and Recorder 7.1 Mail ballot plans 7.1.1 The county clerk must submit a mail ballot plan to the Secretary of State by email no later than 90 days before

More information

The Design of Web Based Secure Internet Voting System for Corporate Election

The Design of Web Based Secure Internet Voting System for Corporate Election The Design of Web Based Secure Internet Voting System for Corporate Election Jagdish B. Chakole 1, P. R. Pardhi 2 \ 1 Deptt. of Computer Science & Engineering, R.C.O.E.M., Nagpur, Maharashtra (India) 2

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

The Role of Cryptography in Cyberscurity. International Colloquium on ICT 19 November 2014, Brussels

The Role of Cryptography in Cyberscurity. International Colloquium on ICT 19 November 2014, Brussels The Role of Cryptography in Cyberscurity International Colloquium on ICT 19 November 2014, Brussels Cybersecurity Cyberspace Cyberspace is becoming the real space Hackers of the 1980 s, 1990 s Advanced

More information

PRECINCT ELECTION OFFICIAL QUICK REFERENCE GUIDE

PRECINCT ELECTION OFFICIAL QUICK REFERENCE GUIDE PRECINCT ELECTION OFFICIAL QUICK REFERENCE GUIDE Bay County Supervisor of Elections POSITION DESCRIPTIONS/ACTIONS 1. Approved I.D. List 2. Deputy 3. Precinct Register Inspector 4. Ballot Issue Table Inspector

More information

Appendix F Wyle Laboratories Test Plan and Test Report

Appendix F Wyle Laboratories Test Plan and Test Report Appendix F Wyle Laboratories Test Plan and Test Report Revisions REVISION Original REPORT NO. Test Plan DATE April 14, 2011 REV DATE PAGE OR PARAGRAPH AFFECTED DESCRIPTION OF CHANGES --- 4-14-11 Entire

More information

HANDBOOK 8 NETWORK SECURITY Version 1.0

HANDBOOK 8 NETWORK SECURITY Version 1.0 Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: assist@dsd.gov.au HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives

More information

Fundamentals of Network Security - Theory and Practice-

Fundamentals of Network Security - Theory and Practice- Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring

More information

Pasco County Supervisor of Elections. Mike Fasano Pasco County Tax Collector DMV Training

Pasco County Supervisor of Elections. Mike Fasano Pasco County Tax Collector DMV Training Pasco County Supervisor of Elections Mike Fasano Pasco County Tax Collector Meet the Supervisor of Elections of Pasco County - Brian E. Corley 2 What we do... The Supervisor of Elections is ministerial

More information

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration

More information

California Association of Clerks and Elections Officials Canvass Subcommittee 2003 www.caceo58.org

California Association of Clerks and Elections Officials Canvass Subcommittee 2003 www.caceo58.org shall be reported according to the number of votes each candidate received from all voters and separately according to the number of votes each candidate received from voters affiliated with each political

More information

Introduction. Conducting a Security Review

Introduction. Conducting a Security Review Chapter 3 PHYSICAL SECURITY Introduction In elections, physical security refers to standards, procedures, and actions taken to protect voting systems and related facilities and equipment from natural and

More information

World-Class Security Infrastructure

World-Class Security Infrastructure Protecting Your Elections Through a World-Class Security Infrastructure 1420 K St. NW Suite 200 Washington, D.C.20005 www.votenet.com 1-800-VOTENETTM 2010 Votenet Solutions, Inc. ELECTION AND VOTING

More information

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13 COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security

More information

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems

More information

Two SSO Architectures with a Single Set of Credentials

Two SSO Architectures with a Single Set of Credentials Two SSO Architectures with a Single Set of Credentials Abstract Single sign-on (SSO) is a widely used mechanism that uses a single action of authentication and authority to permit an authorized user to

More information

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT

More information

Colorado Secretary of State Election Rules [8 CCR ]

Colorado Secretary of State Election Rules [8 CCR ] Rule 2. Voter Registration 2.1 Submission of voter registration forms 2.1.1 An applicant may submit a properly executed voter registration form to the county clerk in person, by mail, by fax, by online

More information

What is Web Security? Motivation

What is Web Security? Motivation brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING 6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information

More information

Volume II, Section 3 Functionality Testing Table of Contents

Volume II, Section 3 Functionality Testing Table of Contents Volume II, Section 3 Functionality Testing Table of Contents 3 Functionality Testing...3-1 3.1 Scope...3-1 3.2 Breadth of Functionality Testing...3-1 3.2.1 Basic Functionality Testing Requirements...3-1

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

VoteID 2011 Internet Voting System with Cast as Intended Verification

VoteID 2011 Internet Voting System with Cast as Intended Verification VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi Puiggali@scytl.com Index Introduction Proposal Security Conclusions 2. Introduction Client computers could

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

California Internet Voting Task Force

California Internet Voting Task Force California Internet Voting Task Force.......... A Report on the Feasibility of Internet Voting January, 2000 Bill Jones Secretary of State 1500 11 th Street Sacramento, California www.ss.ca.gov Internet

More information

Voter Advocate Guide - Georgia. What You Need

Voter Advocate Guide - Georgia. What You Need Voter Advocate Guide - Georgia Basics: What You Need In order to vote in Georgia, you will need to bring any ONE (1) of the following documents to your polling place: - Any valid state or federal government

More information

InkaVote Plus Red Team Security Penetration Test. for. California Secretary of State Debra Bowen. 2-7 October 2007

InkaVote Plus Red Team Security Penetration Test. for. California Secretary of State Debra Bowen. 2-7 October 2007 InkaVote Plus Red Team Security Penetration Test for California Secretary of State Debra Bowen 2-7 October 2007 The Red Team security penetration test for the InkaVote Plus was conducted by atsec information

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Electronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure

Electronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by

More information

Lesson 4: Introduction to network security

Lesson 4: Introduction to network security Lesson 4: Introduction to network security Dr. Justo Carracedo Gallardo carracedo@diatel.upm.es Technical University of Madrid University Professor at the Telecommunication School (EUITT) What is Network

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Massachusetts Voter Registration Information

Massachusetts Voter Registration Information Massachusetts Voter Registration Information The 1998 Higher Education Act requires all postsecondary institutions to make a good faith effort to distribute voter registration information to all students.

More information

Lecture 10: Virtual LANs (VLAN) and Virtual Private Networks (VPN)

Lecture 10: Virtual LANs (VLAN) and Virtual Private Networks (VPN) Lecture 10: Virtual LANs (VLAN) and Virtual Private Networks (VPN) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 10-1 Virtual LANs Description: Group of devices

More information

SCORE An Overview. State of Colorado Registration and Election Management

SCORE An Overview. State of Colorado Registration and Election Management SCORE An Overview State of Colorado Registration and Election Management Table of Contents The Voter Registration Module 3 The Voter Search Module 4 The Voter Merge Module 5 The Batch Scan/Commit Batch

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

SECURE Email User Guide

SECURE Email User Guide SECURE Email User Guide Receiving SECURE Email from Starion Financial Starion Financial is now offering an enhanced email encryption tool, IronPort PXE, which enables the email communication of sensitive

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

The authentication process for validating a user using an external AD or LDAP provider is as follows.

The authentication process for validating a user using an external AD or LDAP provider is as follows. IntelligenceBank - External Authentication Active Directory Integration Overview The authentication process for validating a user using an external AD or LDAP provider is as follows. 1. The user accesses

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

Using etoken for Securing E-mails Using Outlook and Outlook Express

Using etoken for Securing E-mails Using Outlook and Outlook Express Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered

More information

Information Security. Rick Aldrich, JD, CISSP Booz Allen Hamilton Aldrich_Richard@bah.com

Information Security. Rick Aldrich, JD, CISSP Booz Allen Hamilton Aldrich_Richard@bah.com Information Security Rick Aldrich, JD, CISSP Booz Allen Hamilton Aldrich_Richard@bah.com Overview (Fed Info Sys) From NIST SP 800-60, Vol 1, Guide for Mapping Types of Information Systems to Security Categories

More information

NISTIR 7711. Security Best Practices for the Electronic Transmission of Election Materials for UOCAVA Voters

NISTIR 7711. Security Best Practices for the Electronic Transmission of Election Materials for UOCAVA Voters NISTIR 7711 Security Best Practices for the Electronic Transmission of Election Materials for UOCAVA Voters [This page intentionally left blank. ] NISTIR 7711 Security Best Practices for the Electronic

More information

Remote Administration

Remote Administration Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over

More information

How to Secure Your Environment

How to Secure Your Environment End Point Security How to Secure Your Environment Learning Objectives Define Endpoint Security Describe most common endpoints of data leakage Identify most common security gaps Preview solutions to bridge

More information

NISTIR 7682 Information System Security Best Practices for UOCAVA- Supporting Systems

NISTIR 7682 Information System Security Best Practices for UOCAVA- Supporting Systems NISTIR 7682 Information System Security Best Practices for UOCAVA- Supporting Systems Andrew Regenscheid Geoff Beier Santosh Chokhani Paul Hoffman Jim Knoke Scott Shorter [This page intentionally left

More information

Federal Write-in Absentee Ballot (FWAB)

Federal Write-in Absentee Ballot (FWAB) Federal Write-in Absentee Ballot (FWAB) For any questions about this form, consult the Voting Assistance Guide available in hard copy or For absent Uniformed Service members, their families, and citizens

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

Voting Systems Checklist

Voting Systems Checklist 4 12543 Westella, Suite 100, Houston, Texas 77077, 281-293-0101 Voting Systems Checklist Administrative Oversight 1. Have pertinent federal laws which affect voting systems been researched for an understanding

More information

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

Network Security Protocols

Network Security Protocols Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination

More information

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing

More information

Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure

Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 1 Walton Centre Access and Authentication (network) Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 2 Table of Contents Section

More information

Privacy + Security + Integrity

Privacy + Security + Integrity Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels

More information

VOTING IN PIERCE COUNTY

VOTING IN PIERCE COUNTY VOTING IN PIERCE COUNTY VOTING IS IMPORTANT The Pierce County Auditor s Office offers voting options for every voter. This book outlines your options. Who Can Vote? First you must register to vote. You

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information

More information

Summary of Results from California Testing of the ES&S Unity 3.0.1.1/AutoMARK Voting System

Summary of Results from California Testing of the ES&S Unity 3.0.1.1/AutoMARK Voting System Summary of Results from California Testing of the ES&S Unity 3.0.1.1/AutoMARK Voting System The California Secretary of State tasked Freeman Craft McGregor Group (FCMG) to perform functional testing, accessibility

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

Data Normalization in Electronic Voting Systems: A County Perspective

Data Normalization in Electronic Voting Systems: A County Perspective Data Normalization in Electronic Voting Systems: A County Perspective Paul Lux, CERA Supervisor of Elections Okaloosa County, Florida Data Elements The common elements shared by election systems, specifically

More information

Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su

Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o Presented by: Smitha Sundareswaran Chi Tsong Su Introduction Kerberos: An authentication protocol based on

More information

Overview of the proposed solution

Overview of the proposed solution Overview of the proposed solution The proposed voting system will be based on Scytl Online Voting, the leading product in the electronic voting sector for executing transparent and secure elections. Scytl

More information

Overview. Threats and Countermeasures

Overview. Threats and Countermeasures Overview Web services are used by an increasing number of companies as they expose products and services to customers and business partners through the Internet and corporate extranets. The security requirements

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

STATE BOARD OF ELECTIONS

STATE BOARD OF ELECTIONS STATE BOARD OF ELECTIONS PRECINCT ELECTION OFFICERS GUIDE 2016 PRIMARY Last Revised: March 2016 TABLE OF CONTENTS TABLE OF CONTENTS... 1 RESPONSIBILITIES AND AUTHORITY OF ALL PRECINCT ELECTION OFFICERS...

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Board of Elections and Ethics BBOE (DL0)

Board of Elections and Ethics BBOE (DL0) BBOE (DL0) MISSION The, a charter independent agency, is comprised of a three member Board along with a small, but dedicated staff that carries out the agency s mission. The mission of the Board of Elections

More information

Cryptography and Network Security 1. Overview. Lectured by Nguyễn Đức Thái

Cryptography and Network Security 1. Overview. Lectured by Nguyễn Đức Thái Cryptography and Network Security 1. Overview Lectured by Nguyễn Đức Thái Outline Security concepts X.800 security architecture Security attacks, services, mechanisms Models for network (access) security

More information

LA COSTA VALLEY MASTER ASSOCIATION Rules for the Election of Directors by Secret Ballot

LA COSTA VALLEY MASTER ASSOCIATION Rules for the Election of Directors by Secret Ballot LA COSTA VALLEY MASTER ASSOCIATION Rules for the Election of Directors by Secret Ballot The following rules and procedures shall apply in connection with any matter presented to the Members for approval:

More information

Cryptography. Digital security domain. Digital signature. Problems in digital signatures. Firewall. An open network

Cryptography. Digital security domain. Digital signature. Problems in digital signatures. Firewall. An open network Information security technology Teemupekka Virtanen Helsinki University of Technology Telecommunication Software and Multimedia Laboratory teemupekka.virtanen@hut.fi Content 1. Information security technology

More information

Craig Latimer. Precinct Summary Voter Turnout Analysis for 2016 Primary Election Aug/30/2016

Craig Latimer. Precinct Summary Voter Turnout Analysis for 2016 Primary Election Aug/30/2016 101 Voted at Polls 155 70 71 11 3 104 35 7 9 76 76 3 Absentee Voted 329 160 131 33 5 226 59 26 18 153 175 1 Early Voted 104 44 47 12 1 77 19 5 3 52 52 0 3,709 1,271 1,210 1,142 86 2,431 617 363 298 1,734

More information

State of Iowa Approved Voting Systems

State of Iowa Approved Voting Systems General Information About Voting Equipment Certification in Iowa: Only voting systems on this list can be used for elections in Iowa. This equipment has been examined and approved for use by the Iowa Board

More information

Know Before You Go: Virginia Photo Voter Identification: Q &A

Know Before You Go: Virginia Photo Voter Identification: Q &A Know Before You Go: Virginia Photo Voter Identification: Q &A Q: Do I need to show ID when I go to vote? A: Yes. This is not exactly new, because in Virginia, voters have been required to show ID to vote

More information

Network Security Essentials Chapter 7

Network Security Essentials Chapter 7 Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,

More information

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Frequently Asked Questions (FAQs) SIPRNet Hardware Token Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:

More information

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Electronic Voting Committee General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-0.98 Date: 23 May 2016 Tallinn 2016 Annotation This paper

More information

Bureau of Voting Systems Test Report

Bureau of Voting Systems Test Report Bureau of Voting Systems Test Report Dominion Voting Systems, Inc. GEMS Release 1.21.6, Version 1 OSX SSL Certificate Update Florida Department of State KEN DETZNER Secretary of State December 2013 R.

More information