Internet voting feasibility study

Size: px
Start display at page:

Download "Internet voting feasibility study"

Transcription

1 Internet voting feasibility study A summary Table of contents Introduction... 2 System functionality... 3 System requirements... 5 Information security... 6 Additional requirements concerning information security... 6 Residual threats Cost and benefit analysis... 8 Benefits... 8 Costs... 8 Cost factors... 8 Implementation alternatives... 9 Quality goals Integration with other systems Procuring the system and market overview Plan for implementation and deployment Summary v 1.0 1

2 Introduction On the request by the Ministry of Justice its Action Programme on eservices and edemocracy (SADe) and eparticipation Environment Project, Codento was asked to conduct a feasibility study on internet voting and its viability in Finland. Codento arranged three workshops with the internet voting working group and its appointed experts. The workshops yielded a 25-page feasibility study document of which this document is a summary. By internet voting, in this context, we understand voting in a consultative communal referendum by using voters own terminal equipment (desktop and laptop computers, tablets and mobile phone). Legally binding elections were not a main interestest of the feasibility study. Provisions on consultative municipal referenda are laid down by an act. According to the act on the procedure for holding municipal consultative referenda (656/1990), the voters can vote either by mail in advance (i.e. postal voting) or at a polling station during the voting day. When voting by mail, the voter encloses his/her vote in an envelope together with other identifying material and sends the envelop to the central election committee. The intention is to introduce internet voting along with other voting channels.. The current procedure of postal voting is so cumbersome that large cities are unable to arrange consultative referenda. Consultative referenda have less strict information security requirements than binding elections. Thus, a system which is secure enough for referenda is not secure enough for elections. Furthermore, it is not easy, if at all possible, to turn a referenda voting system into election voting system. This feasibility study deal with election related issues and considerations in less detailed manner than referenda. The Finnish government can either get a referendum voting system implemented by selected software companies or buy an already implemented system from the market. In order to decide v 1.0 2

3 which approach is the most suitable one, this document explores alternative ways of implementing the system. System functionality Internet voting is suitable for replacing or complementing voting by mail in advance before the actual voting / polling day. This is the simplest and easiest to understand alternative. Allowing voters to vote via internet during election day causes hard to solve complexities and information security issues. The internet voting system for consultative referenda works as follows. The systems has the following components Device for identifying the voter and performing cryptographic operations (secure ID card or mobile phone with security device or similar) Voter s terminal Voting application VETUMA - the identity service v 1.0 3

4 Voting server Ballot box database Tallying server Result database The system works as follows 1: The tallying server sends the public key K2 of the election committee to the voting server. 2: The voter downloads the voting application. The application can be either a native application for voter s terminal or a javascript application. 3: The voter identifies himself/herself using some method provided by VETUMA. The terminal gets to know voter s identity, or ID. 4: The terminal asks the voting server for referendum information (alternatives, voting area, etc) by giving voter s ID. 5: The voting server gives voter s terminal the public key K2. 6: The voter casts his/her vote V by using the voting application. 7: The terminal encrypts the vote using key K2. The result is K2(v). 8. The terminal uses the cryptographic device and signs the vote K2(V) and identity ID. The result is K1(K2(V), ID). 9: The terminal sends K1(K2(V), ID) to the voting server. 10: The voting server identifies the voter using the public key corresponding to the private key K1 and saves the pair (K2(V), ID) to the ballot box database. If the voter casts several votes, the last one counts. 11: When the referendum closes, the voting server sends all encrypted votes to the tallying server. v 1.0 4

5 12: The tallying server uses its private key and decrypts the votes and saves them in the result database. The tallying server than counts the votes and publishes the referendum result. The key K1 is necessary for preventing man-in-the-middle attacks. The referendum system may be secure enough without key K1 since the current voting by mail is not secure either. This system relies on trusting the voting application. If an attacker can replace the voting application, he can changes voters votes. Detecting this is very hard. System requirements There are some fundamental requirements for the referendum systems, or internet voting system in general. In addition the these requirements, there are some information security requirements, of which more details later. V1: Reliable identification of voter s identity and suffrage V2: One vote for one voter V3: Voting security, or secrecy of votes V4: Immutability of cast votes V5: Voter must be able to ensure himself/herself that the votes has been handled and saved by the system correctly. V6: The voter must be able to know, that the vote has been tallied properly. V7: Reliable verification of the voting results after the initial tallying. V8: Internet voting must be possible with common terminal devices. V9: The Finnish State must be the owner and administrator of the voting system. v 1.0 5

6 V10: The system and its source code must be available for inspection to citizens, organisations, experts, and election observers. V11: The system must be usable for people with disabilities. V12: The system must be impartial. V13a: The system must be compatible with the current voting administration system. V13b: The system must work without the current voting administration system. The system presented above does not meet requirements V5 and V6.This is acceptable since the current procedure - voting by mail - does not meet the requirements either. Information security Analysing information security of the proposed system is not straightforward for several reason. First, the exact purpose and use of the system is not yet clear, mostly due to missing legislation. Second, even though the system is intended for referenda, there were discussions about using similar kind of system for binging elections. The risks and threats differ significantly between referenda and elections. In addition, information security community insist on starting from most demanding scenarios. In this case, that would be elections, which were not the main concern here. The most significant threats are The selected vendor may not be able to build secure enough a system Security of voters terminals and their software. Denial of service attacks against the referendum system or some other essential, integrated system. Operator errors and mistakes. Missing or ignored security procedures. Lack of vigilance while an referendum is ongoing. Additional requirements concerning information security There are several additional system requirements from the information security point of view. v 1.0 6

7 V14: The system must be able to handle information of ST 1 IV security level. Some functional requirements may require even ST III level. Should the system be designed for elections, the requirement would be even stricted (ST II). V15: The level of information security of the system must be elevated. V16: The level of ICT preparedness of the system must be high. V17: Should the system be used during the election/referendum day, its availability must exceed JHS 174 requirements. V18: The design of referendum processes, including creation of key pairs, must be very careful in order to minimize any errors. V19: Referendum processes must be carried out with care and must yield documented and verifiable results. V20: The system must keep comprehensive logs at several levels (operating system, communication, database, application). The logs must be designed so that no combination of them breaks the secrecy of referendum. V21: The system must allow and enable OSCE election monitoring. V22: There must be enough resources for detecting and preventing information security threats and attacks during the referendum/elections. V23: No single person must be able to manipulate the results. Residual threats. The following threats will remain even after the previous requirements are met. 1 ST = suojaustaso, or Protection Level v 1.0 7

8 Security of voting depends of security of users terminals. It is very hard to make sure that the terminals do not contain any malicious software and work as intended. If key K1 is not used (see figure 1), this is next to impossible. The vendor of the system and its employees play a key role in information security. In case they are not trustworthy, the system will not be. This can be mitigated by third-party testing, open sourcing the code, etc, but some risk remains. The staff operating the system will have wide permission in order to operate the system. Novel methods must be devised to prevent them abusing their permissions. The system depends on external systems (e.g VETUMA identity verification system for user identification). Any denial of service attacks may cripple the referendum system. The notion of archiving is open. Any long term archiving is a risk. These residual risks must be mitigated before the system is taken into use. Cost and benefit analysis Benefits The main benefits of internet voting are: less manual work required more participation in the democratic processes possibility to arrange referenda in large cities voting easier for disabled people easier voting abroad Only the first benefit can be readily studies in terms of money. In short, elections in Finland tend to cost about 5 /vote, ⅔ of which is administration and manual counting costs.this is the amount which might be saved by using internet voting. Costs Cost factors There are several alternative systems, costs of which we consider. In order of increasin cost, the alternative are: 1. Only checking voters identities, voting in advance with together letter voting, voting only once, no voting on election day. v 1.0 8

9 2. As with #1, but possibly voting many times, the last vote counts. 3. As with #2, but also voting during election day. 4. As with #1, but encrypting/signing the vote 5. As with #2, but encrypting/signing the vote 6. As with #3, but encrypting/signing the vote Implementation alternatives The cheapest alternative is the #1. It costs more or less twice the amount kansalaisaloite.fi cost. Alternative #2 requires the servers to identify votes and only count the last vote (by internet or by mail). Alternative #3 requires high availability and fault tolerance. The alternatives #4, #5 and #6 require encryption and electronic signatures, which in turn require some equipment to perform the operations. Since referenda do not require this level of information security, we shall not estimate the costs of these alternatives. We estimate the following cost structure for systems #1, #2 and #3. Maintenance includes system maintenance, bug corrections and small improvements as well server costs and similar. Operation includes personnel costs in operations and monitoring. System Procurement Annual maintenance Annual operations System #1: kansalaisaloite + ballot box System #2. 1+enhanced terminal SW + secure ballot box System #3. 2+ dublication + high availability X X/6 100 k 1.5 * X = Y Y/6 100 k 3.25 * X = Z Z/6 200 k Including electronic signature would add 20% to these costs. We can compare the costs to the benefits (saving 4 per vote) if we make the following assumptions. several ballots ongoing at any time v 1.0 9

10 procurement cost euros maintenance euros a year operations euros a year, twice that for the high-availability system depreciation in 5 years Internet votings saves 1,5 per vote as a conservative estimate These assumptions give break-even points for system #2 and #3 as and voters per year, respectively. The following table shows the exact numbers. Annual expenses System Procurement cost Depreciation, 5 years Maintenan ce Operations Annual votes required for breakeven 1. Only voter identification, no multiple voting, advance voting only 2. As #1, but possibility to vote many times (last vote counts) 3. As #2, but also voting during election day 0% % % % % % % % % The table shows also ±30% confidence levels. v

11 The number of annual votes required for break-even are quite low. This means that from costbenefit point of view, a system for internet voting in non-binding referenda would make sense. For binding elections, the cost estimates are much higher due to stricter security requirements. Furthermore, it is not feasible to try to develop an election system from referendum system. Adding security is usually much harder than relaxing security. Quality goals The internet voting system has high quality goals. Only a high quality system will be dependable and gain the trust of voters and society in general. High quality comes from being open source, being audited and verified by several independent people and organizations. The system must be open for inspection. In addition to audits, the software development process used for implementing the system must be of high quality. This includes requirements analysis and tracing, automated building and testing, comprehensive code reviews and understanding the assumptions on which the system relies. Integration with other systems The internet voting systems is not a stand-alone system. It needs services from other systems. The most important integrations are Election information system (vaalitietojärjestelmä) Population information register (väestötietojärjestelmä) VETUMA identity system Operation systems Monitoring systems Users terminals The election information system provides information about voters, voting districts, and similar issues. It also provides results for media. The internet voting system would benefit from using these existing services. v

12 Population information register can provide information about voting districts and voters in case the election information systems is not used due to e.g. cost issues. This maybe be the case with referenda, but not with proper elections. VETUMA verifies identities of voters and election officials. It does not provide electronic signatures and thus some other system is necessary for that. In the figure 1, the K1 is used for signatures. The operators use operation systems. They are, in fact, part of the internet voting system and created by the same vendors. The monitoring systems are necessary for verifying that the internet voting system works as it should and that there are no attacks on it. Monitoring systems must provide write-only-once logging services. The users of operation and monitoring systems must not be same individuals. Users terminals must be able to perform the necessary operation without risking the secrecy and security of voting: signing and encrypting the vote, making sure that the vote was cast properly all the way to the result server. Even though any modern terminal should be usable, there may well be some restrictions (e.g. voting and verifying using different terminals as in Estonia s case, etc). Procuring the system and market overview The internet voting system should be open source, since no closed system would gain enough trust. Without trust, the system would not be used and voting results might be easily contested. During the market survey in 2014, no vendor was willing to provide an open source system. This is not a big problem, since implementing a system for internet referendums is well within capabilities many Finnish software companies. There should not be any problems with finding companies willing to use open source. It is recommendable to procure an open-source systems from a vendor that uses agile, iterative development processes. The processes will also allow procuring work from competent designers and coders from many companies. For a referenda system, a team of less than 10 competent designers, coders, testers and security experts will be sufficient. v

13 Plan for implementation and deployment The internet voting should be implemented in increments. Also, its deployment should be incremental, done with several pilot deployments. The pilots should proceed from simple, notso-important cases towards referenda. This way it will be possible to take user feedback into account. Summary As a summary, the following observations arise. A system for conducting referenda in the internet is rather light weight and simple to implement. Procuring such a system is recommendable, since its usage would create significant experiences for refining requirements of a proper internet election system. The systems for referenda and elections are so different, that a single system is not sufficient. The referenda system can and should be deployed incrementally. A system for proper, binding elections is most likely rather expensive to implement. Conducting proper elections via internet is very difficult given the current state-of-the art information security knowledge. If the referenda system is in use during the referendum day, it will be very hard to recover from any errors or attacks. The system will not be very reliable. Use of internet voting during the referendum/election day is not recommendable. If an attacker is able to alter the voting software in users terminals, the attacker can change votes at will. Preventing this kind of attack is extremely hard. v

E-Democracy and e-voting

E-Democracy and e-voting E-Democracy and e-voting How to make them secure and transparent August 2013 Jordi Puiggali CSO and SVP R&D Jordi.puiggali@scytl.com Index Introduction e-democracy Security and Transparency in e-voting

More information

Voting with confidence

Voting with confidence Voting with confidence Report of the Election Process Advisory Commission Summary, Conclusions and Recommendations 27 September 2007 Summary The Commission considers that the election process in the Netherlands

More information

VoteID 2011 Internet Voting System with Cast as Intended Verification

VoteID 2011 Internet Voting System with Cast as Intended Verification VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi Puiggali@scytl.com Index Introduction Proposal Security Conclusions 2. Introduction Client computers could

More information

Online Voting Project. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles.

Online Voting Project. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles. Introduction. Since 2001 T-Systems made research on secure online voting systems

More information

Speaker s Commission on Digital Democracy Consultation on Electronic Voting

Speaker s Commission on Digital Democracy Consultation on Electronic Voting UKCRC/2014/4 Speaker s Commission on Digital Democracy Consultation on Electronic Voting UKCRC Response The UK Computing Research Committee (UKCRC), an Expert Panel of the British Computer Society (BCS),

More information

2. All references to Returning Officers in this code should be taken to refer to Counting Officers for referendums.

2. All references to Returning Officers in this code should be taken to refer to Counting Officers for referendums. Code of conduct for political parties, candidates, canvassers and campaigners on the handling of postal vote applications and postal ballot papers in England and Wales Introduction 1. Political parties,

More information

2.1 To define the backup strategy for systems and data within the Cape Winelands District Municipality (CWDM).

2.1 To define the backup strategy for systems and data within the Cape Winelands District Municipality (CWDM). BACKUP POLICY POLICY ADOPTED BY COUNCIL ON 25 APRIL 2012 AT ITEM C.14.3 POLICY AMENDED BY COUNCIL ON 24 APRIL 2014 AT ITEM C.14.1 Cape Winelands District Municipality Backup Policy 1. 1. INTRODUCTION Computer

More information

1. The Electoral Commission (the Commission) welcomes the UK Government s second consultation on prisoners voting rights.

1. The Electoral Commission (the Commission) welcomes the UK Government s second consultation on prisoners voting rights. Electoral Commission response to the Ministry of Justice consultation Voting Rights of Convicted Prisoners Detained within the United Kingdom (second stage) 1. The Electoral Commission (the Commission)

More information

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Electronic Voting Committee General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-0.98 Date: 23 May 2016 Tallinn 2016 Annotation This paper

More information

Pre-Election Audit of Memory Cards for the August 2008 Connecticut Primary Elections

Pre-Election Audit of Memory Cards for the August 2008 Connecticut Primary Elections VoTeR Center UConn Voting Technology Research Center PI:A.Shvartsman,Ph.D. Co-PIs : A. Kiayias, Ph.D., L. Michel, Ph.D., A. Russell, Ph.D. Staff: T. Antonyan, S. Davtyan, S. Kentros, N. Nicolaou, A. See,

More information

Comparison of e-voting schemes: Estonian and Norwegian solutions

Comparison of e-voting schemes: Estonian and Norwegian solutions Comparison of e-voting schemes: Estonian and Norwegian solutions M J Morshed Chowdhury morshed@ut.ee NordSecMob, University of Tartu Abstract. In October 2005, Estonia organized countrywide remote e- voting.

More information

Performance standards for Returning Officers in Great Britain

Performance standards for Returning Officers in Great Britain Performance standards for Returning Officers in Great Britain December 2011 Presented to Parliament pursuant to section 9A of the Political Parties, Elections and Referendums Act 2000 Translations and

More information

Cisco Trust Anchor Technologies

Cisco Trust Anchor Technologies Data Sheet Cisco Trust Anchor Technologies Overview Cisco Trust Anchor Technologies provide the foundation for trustworthy systems across Cisco. The Cisco Trust Anchor and a Secure Boot check of signed

More information

An Electronic Voting System Based On Blind Signature Protocol

An Electronic Voting System Based On Blind Signature Protocol CSMR, VOL. 1, NO. 1 (2011) An Electronic Voting System Based On Blind Signature Protocol Marius Ion, Ionuţ Posea University POLITEHNICA of Bucharest Faculty of Automatic Control and Computers, Computer

More information

Business Plan: Municipal Elections

Business Plan: Municipal Elections Business Plan: Municipal Elections How does this service contribute to the results identified in the City of London Strategic Plan? A Vibrant and Diverse Community By conducting the municipal election

More information

Spillemyndigheden s Certification Programme Information Security Management System

Spillemyndigheden s Certification Programme Information Security Management System SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 3 2.1 Certification frequency... 3 2.1.1 Initial certification...

More information

SENATE BILL 6139. State of Washington 64th Legislature 2015 2nd Special Session

SENATE BILL 6139. State of Washington 64th Legislature 2015 2nd Special Session S-.1 SENATE BILL State of Washington th Legislature nd Special Session By Senators Miloscia and Roach Read first time 0//. Referred to Committee on Government Operations & Security. 1 AN ACT Relating to

More information

PUBLIC REPORT. Red Team Testing of the ES&S Unity 3.0.1.1 Voting System. Freeman Craft McGregor Group (FCMG) Red Team

PUBLIC REPORT. Red Team Testing of the ES&S Unity 3.0.1.1 Voting System. Freeman Craft McGregor Group (FCMG) Red Team PUBLIC REPORT Red Team Testing of the Voting System Freeman Craft McGregor Group (FCMG) Red Team Prepared for the California Secretary of State by: Jacob D. Stauffer, FCMG Red Team Project Manager Page

More information

Chapter 8 Software Testing

Chapter 8 Software Testing Chapter 8 Software Testing Summary 1 Topics covered Development testing Test-driven development Release testing User testing 2 Program testing Testing is intended to show that a program does what it is

More information

Secure Electronic Voting

Secure Electronic Voting 7 th Computer Security Incidents Response Teams Workshop Syros,, Greece, September 2002 Secure Electronic Voting New trends, new threats... Prof.. Dr. Dimitris Gritzalis Dept. of Informatics Athens University

More information

Volume I, Appendix C Table of Contents

Volume I, Appendix C Table of Contents Appendix C for Voting Officials (Informative) Volume I, Appendix C Table of Contents C Appendix for Voting Officials.... 1 C.1 for Human Factors.... 1 C.2 for Security... 4 i May 9, 2005 Appendix C for

More information

The Importance of Perimeter Security

The Importance of Perimeter Security REPRINT FEBRUARY 2013 healthcare financial management association hfma.org a new approach to IT security FEATURE STORY REPRINT FEBRUARY 2013 healthcare financial management association hfma.org a new approach

More information

Cryptography: Authentication, Blind Signatures, and Digital Cash

Cryptography: Authentication, Blind Signatures, and Digital Cash Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,

More information

Why can t I vote online? ONLINE SECURITY AND THE FUTURE OF INTERNET VOTING

Why can t I vote online? ONLINE SECURITY AND THE FUTURE OF INTERNET VOTING Why can t I vote online? ONLINE SECURITY AND THE FUTURE OF INTERNET VOTING Verified Voting Founded in 2004 by computer scientists Non-partisan, not for profit. Focus on elections technology security, auditability,

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

Electronic voting. May 2007 electoral pilot schemes

Electronic voting. May 2007 electoral pilot schemes August 2007 Summary Electronic voting May 2007 electoral pilot schemes At the May 2007 local government elections in England, five local authorities held pilot schemes trialling electronic voting, principally

More information

ABB s approach concerning IS Security for Automation Systems

ABB s approach concerning IS Security for Automation Systems ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik stefan.kubik@de.abb.com The problem Most manufacturing facilities are more connected (and

More information

California Internet Voting Task Force

California Internet Voting Task Force California Internet Voting Task Force.......... A Report on the Feasibility of Internet Voting January, 2000 Bill Jones Secretary of State 1500 11 th Street Sacramento, California www.ss.ca.gov Internet

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

E-Voting System and Its Importance

E-Voting System and Its Importance LEGAL, OPERATIONAL AND TECHNICAL STANDARDS FOR E-VOTING Recommendation Rec(2004)11 adopted by the Committee of Ministers of the Council of Europe on 30 September 2004 and explanatory memorandum Council

More information

Information and Communication Technology. Patch Management Policy

Information and Communication Technology. Patch Management Policy BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center Intrusion Prevention and Detection No: Effective: OSC-12 5/21/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

NASCIO 2013 State IT Recognition Award Nomination. California Election Results Website. Open Government Initiatives

NASCIO 2013 State IT Recognition Award Nomination. California Election Results Website. Open Government Initiatives 1 ONLINE VOTER REG. CARD ~ Office 2007 NASCIO 2013 State IT Recognition Award Nomination Title: California Election Results Website Category: Open Government Initiatives Contact: Chris Maio Information

More information

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY An Olenick & Associates White Paper July 2013 Contents Executive Summary... 1 Mobile Vision... 3 QA Methodology and Process... 4 Deployment

More information

Office for Democratic Institutions and Human Rights ESTONIA. PARLIAMENTARY ELECTIONS 1 March 2015. OSCE/ODIHR ELECTION EXPERT TEAM Final Report

Office for Democratic Institutions and Human Rights ESTONIA. PARLIAMENTARY ELECTIONS 1 March 2015. OSCE/ODIHR ELECTION EXPERT TEAM Final Report Office for Democratic Institutions and Human Rights ESTONIA PARLIAMENTARY ELECTIONS 1 March 2015 OSCE/ODIHR ELECTION EXPERT TEAM Final Report Warsaw 26 May 2015 TABLE OF CONTENTS I. EXECUTIVE SUMMARY...

More information

The Design of Web Based Secure Internet Voting System for Corporate Election

The Design of Web Based Secure Internet Voting System for Corporate Election The Design of Web Based Secure Internet Voting System for Corporate Election Jagdish B. Chakole 1, P. R. Pardhi 2 \ 1 Deptt. of Computer Science & Engineering, R.C.O.E.M., Nagpur, Maharashtra (India) 2

More information

2011 municipal and county council elections

2011 municipal and county council elections Important voter information 2011 municipal and county council elections Election day is 12 September. Remember to bring ID! English engelsk 2011 municipal and county council elections The municipal council

More information

SANS Institute First Five Quick Wins

SANS Institute First Five Quick Wins #1 QUICK WIN- APPLICATION WHITELISTING SANS Critical Controls: #2: Inventory of Authorized and Unauthorized Software 1) Deploy application whitelisting technology that allows systems to run software only

More information

Management of Official Records in a Business System

Management of Official Records in a Business System GPO Box 2343 ADELAIDE SA 5001 Tel (08) 8204 8773 Fax (08) 8204 8777 DX:467 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Management of Official Records in a Business System October 2011 Version

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

Thank you in advance for your consideration,

Thank you in advance for your consideration, On behalf of i3logix, Inc, it is our pleasure to submit our information for consideration by the Colorado Department of State Elections Division. Our patent-pending, mail-ballot tracking & alert system,

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-

Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft- Musina Local Municipality Information and Communication Technology User Account Management Policy -Draft- Version Control Version Date Author(s) Details V1.0 June2013 Perry Eccleston Draft Policy Page

More information

Information Technology Branch Access Control Technical Standard

Information Technology Branch Access Control Technical Standard Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,

More information

Malicious Email Mitigation Strategy Guide

Malicious Email Mitigation Strategy Guide CYBER SECURITY OPERATIONS CENTRE Malicious Email Mitigation Strategy Guide Introduction (UPDATED) SEPTEMBER 2012 1. Socially engineered emails containing malicious attachments and embedded links are commonly

More information

Encryption-based 2FA for Server-side Qualified Signature Creation

Encryption-based 2FA for Server-side Qualified Signature Creation S C I E N C E P A S S I O N T E C H N O L O G Y Encryption-based 2FA for Server-side Qualified Signature Creation Christof Rath, christof.rath@iaik.tugraz.at Institute for Applied Information Processing

More information

Case Studies on E-Voting

Case Studies on E-Voting University of Fribourg Information Systems Research Group Seminar work on E-government Case Studies on E-Voting Students: Professor: Assistant: Daniele Cavadini Dr. Andreas Meier Nicolas Werro Lorenzo

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

ICT USER ACCOUNT MANAGEMENT POLICY

ICT USER ACCOUNT MANAGEMENT POLICY ICT USER ACCOUNT MANAGEMENT POLICY Version Control Version Date Author(s) Details 1.1 23/03/2015 Yaw New Policy ICT User Account Management Policy 2 Contents 1. Preamble... 4 2. Terms and definitions...

More information

A Survey of Current Secret-Ballot Systems David Chaum

A Survey of Current Secret-Ballot Systems David Chaum A Survey of Current Secret-Ballot Systems David Chaum WOTE ANALYSIS Outline Models, Taxonomy of Tools, Key Technologies, Paradigms, Composition, etc SYSTEMS Mainstream US deployed (with comparison) New/proposed

More information

Le vote électronique : un défi pour la vérification formelle

Le vote électronique : un défi pour la vérification formelle Le vote électronique : un défi pour la vérification formelle Steve Kremer Loria, Inria Nancy 1 / 17 Electronic voting Elections are a security-sensitive process which is the cornerstone of modern democracy

More information

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org

Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org SDLA-312 ISA Security Compliance Institute Security Development Lifecycle Assurance - Security Development Lifecycle Assessment v3.0 Lifecycle Phases Number Phase Name Description PH1 Security Management

More information

Colorado Secretary of State Election Rules [8 CCR 1505-1]

Colorado Secretary of State Election Rules [8 CCR 1505-1] Rule 7. Elections Conducted by the County Clerk and Recorder 7.1 Mail ballot plans 7.1.1 The county clerk must submit a mail ballot plan to the Secretary of State by email no later than 90 days before

More information

Spillemyndigheden s Certification Programme Information Security Management System

Spillemyndigheden s Certification Programme Information Security Management System SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Introduction... 3 1.1 Spillemyndigheden s certification programme... 3 1.2 Objectives of the... 3 1.3 Scope of this document... 4 1.4 Definitions...

More information

E-Voting through the Internet and with Mobile Phones

E-Voting through the Internet and with Mobile Phones E-Voting through the Internet and with Mobile Phones Giampiero E.G. Beroggi, Statistical Office Canton Zurich, Switzerland The Swiss e-voting system, developed and used by the Canton Zurich, is unique

More information

Start building a trusted environment now... (before it s too late) IT Decision Makers

Start building a trusted environment now... (before it s too late) IT Decision Makers YOU CAN T got HAP Start building a trusted environment now... IT Decision Makers (before it s too late) HAP reference implementations and commercial solutions are available now in the HAP Developer Kit.

More information

Introduction. Conducting a Security Review

Introduction. Conducting a Security Review Chapter 3 PHYSICAL SECURITY Introduction In elections, physical security refers to standards, procedures, and actions taken to protect voting systems and related facilities and equipment from natural and

More information

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us Emerging threats for the healthcare industry: The BYOD Revolution By Luca Sambucci www.deepsecurity.us Copyright 2013 Emerging threats for the healthcare industry: The BYOD REVOLUTION Copyright 2013 Luca

More information

ViPNet EDI. drive your collaboration secure

ViPNet EDI. drive your collaboration secure ViPNet EDI drive your collaboration secure What is ViPNet EDI? Electronic data interchange (EDI) systems are used for standardized electronic data exchange. They include exchange standards, electronic

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

UNCLASSIFIED Version 1.0 May 2012

UNCLASSIFIED Version 1.0 May 2012 Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice

More information

Board Portal Security: How to keep one step ahead in an ever-evolving game

Board Portal Security: How to keep one step ahead in an ever-evolving game Board Portal Security: How to keep one step ahead in an ever-evolving game The views and opinions expressed in this paper are those of the author and do not necessarily reflect the official policy or position

More information

15 Organisation/ICT/02/01/15 Back- up

15 Organisation/ICT/02/01/15 Back- up 15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional

More information

Regulatory Framework for Communications Security and Privacy in Greece

Regulatory Framework for Communications Security and Privacy in Greece Regulatory Framework for Communications Security and Privacy in Greece Georgia Bafoutsou, Nikolaos Antoniadis, Eugenia Nikolouzou, Athanasios Panagopoulos Authority for the Assurance of Communications

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Guidance for candidates and agents

Guidance for candidates and agents European Parliamentary elections in Great Britain Guidance for candidates and agents Part 5 of 6 Your right to attend key electoral events This document applies only to the 22 May 2014 European Parliamentary

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

Remote (Internet) Voting in Digital India

Remote (Internet) Voting in Digital India Remote (Internet) Voting in Digital India Ideas for today and tomorrow National Conference on Remote Voting (NCRV) 2015 20-21 st July 2015 @IITM, Meghdoot, Pune The fundamental challenge in public voting

More information

Using etoken for Securing E-mails Using Outlook and Outlook Express

Using etoken for Securing E-mails Using Outlook and Outlook Express Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered

More information

a new approach to IT security

a new approach to IT security REPRINT FEBRUARY 2013 healthcare financial management association hfma.org a new approach to IT security FEATURE STORY REPRINT FEBRUARY 2013 healthcare financial management association hfma.org a new approach

More information

Credibly secure cloud storage with elfcloud

Credibly secure cloud storage with elfcloud Credibly secure cloud storage with elfcloud Privacy of private clouds with the cost of the public cloud Datacenter IaaS workshop 2014 / 12.9.2014 Tuomas Tonteri Founder and CEO Abstract elfcloud is a Finland

More information

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems

More information

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015. Android Based E-Voting. Harshad Velapure, Saurabh Rai, Saransh Sharma, Preetam Naiknavre, Pranali Jadhav, Kalyan Bamane Department of Information Technology, D. Y. Patil College of Engineering, Akurdi,

More information

Technical Evaluation of Rushmoor Borough Council e-voting Pilot 2007 ACTICA/PA468D009-1.1

Technical Evaluation of Rushmoor Borough Council e-voting Pilot 2007 ACTICA/PA468D009-1.1 Technical Evaluation of Rushmoor Borough Council e-voting Pilot 2007 ACTICA/PA468D009-1.1 31 July 2007 List of Contents 1 Foreword 1 2 Introduction 3 3 Pilot objectives 5 3.1 Objectives 5 3.2 Success

More information

Security challenges for internet technologies on mobile devices

Security challenges for internet technologies on mobile devices Security challenges for internet technologies on mobile devices - Geir Olsen [geiro@microsoft.com], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [anild@microsoft.com],

More information

FairWarning Mapping to PCI DSS 3.0, Requirement 10

FairWarning Mapping to PCI DSS 3.0, Requirement 10 FairWarning Mapping to PCI DSS 3.0, Requirement 10 Requirement 10: Track and monitor all access to network resources and cardholder data Logging mechanisms and the ability to track user activities are

More information

Using Continuous Monitoring Information Technology to Meet Regulatory Compliance. Presenter: Lily Shue Director, Sunera Consulting, LLC

Using Continuous Monitoring Information Technology to Meet Regulatory Compliance. Presenter: Lily Shue Director, Sunera Consulting, LLC Using Continuous Monitoring Information Technology to Meet Regulatory Compliance Presenter: Lily Shue Director, Sunera Consulting, LLC Outline Current regulatory requirements in the US Challenges facing

More information

SAMPLE FORM. Rules for the Election and Removal of Directors by Secret Ballot

SAMPLE FORM. Rules for the Election and Removal of Directors by Secret Ballot SAMPLE FORM Rules for the Election and Removal of Directors by Secret Ballot In connection with the election and removal of directors, the following rules and procedures shall apply: 1. Meeting at Which

More information

EWICS London, January 18, 2005 BSI. Safety-Related Security. Concepts 17.03.2005-1

EWICS London, January 18, 2005 BSI. Safety-Related Security. Concepts 17.03.2005-1 EWICS London, January 18, 2005 Safety-Related Security Concepts - 1 Safety Requirements Top-level requirements for the PES: functional behavior System Safety depends on other attributes, i.e.: accuracy

More information

What security and assurance standards does Trustis use for TMDCS certificate services?

What security and assurance standards does Trustis use for TMDCS certificate services? Frequently Asked Questions What is a Digital Certificate? What is a Root Certificate? How do Digital Certificates Work? Who needs a Digital Certificate? How do I get a Digital Certificate Can I use my

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Executable Integrity Verification

Executable Integrity Verification Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Parish Polls. Consultation on the Government s intentions to modernise parish poll regulations

Parish Polls. Consultation on the Government s intentions to modernise parish poll regulations Parish Polls Consultation on the Government s intentions to modernise parish poll regulations December 2014 Department for Communities and Local Government Crown copyright, 2014 Copyright in the typographical

More information

Online Voting for Better Government State IT Management Initiative

Online Voting for Better Government State IT Management Initiative Nomination: Marshall University s On-line Voting for Better Government Online Voting for Better Government State IT Management Initiative Nomination Form May 23, 2003 extension to deadline granted. Title

More information

Security within a development lifecycle. Enhancing product security through development process improvement

Security within a development lifecycle. Enhancing product security through development process improvement Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web

More information

De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de

De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook

More information

1. Scope of application

1. Scope of application Terms and conditions for electronic communication 1. Scope of application These terms and conditions apply to electronic communication undertaken by the Customer or the User using ebanking or telephone

More information

Public Cloud Security: Surviving in a Hostile Multitenant Environment

Public Cloud Security: Surviving in a Hostile Multitenant Environment Public Cloud Security: Surviving in a Hostile Multitenant Environment SESSION ID: EXP-R01 Mark Russinovich Technical Fellow Windows Azure, Microsoft @markrussinovich The Third Computing Era Security Could

More information

Information Technology Policy

Information Technology Policy Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review RA-ITCentral@pa.gov

More information

SecureStore I.CA. User manual. Version 2.16 and higher

SecureStore I.CA. User manual. Version 2.16 and higher User manual Version 2.16 and higher Contents SecureStore I.CA 1. INTRODUCTION...3 2. ACCESS DATA FOR THE CARD...3 2.1 Card initialisation...3 3. MAIN SCREEN...4 4. DISPLAYING INFORMATION ABOUT THE PAIR

More information

Secure Code Development

Secure Code Development ISACA South Florida 7th Annual WOW! Event Copyright Elevate Consult LLC. All Rights Reserved 1 Agenda i. Background ii. iii. iv. Building a Business Case for Secure Coding Top-Down Approach to Develop

More information

Position Statement on Electronic Voting

Position Statement on Electronic Voting Position Statement on Electronic Voting Jeffrey S. Chase Department of Computer Science Duke University December 2004 (modified 11/2006) This statement is a response to several requests for my position

More information