Describe, explain and show your understanding of the threats using appropriate terminology from the articles provided (attached as files or links).
Describe, explain and show your understanding of the threats using appropriate terminology from the articles provided (attached as files or links).
April 23, 2021 Comments Off on Describe, explain and show your understanding of the threats using appropriate terminology from the articles provided (attached as files or links). Uncategorized Assignment-helpPurpose:
The purpose of this assignment is to demonstrate your understanding of security threats to e-government services by looking at e-voting as a government service and be able to suggest solutions to security problems related to e-voting and the security architecture of the service.
Format:
1. A report , not including front page, table of contents, appendix and references, discussing what you consider to be 3-5 of the most serious threats for e-voting systems in your home country or a country of your choice (please, do not write about Estonia, unless absolutely necessary). It can be difficult to find countries where e-voting is implemented on a national level, but you may also chose a country where there have been pilots, projects or now cancelled e-voting services. You may use this link to assist you in finding a country http://www.idea.int/news-media/media/use-e-voting-around-world (it is a few years old, but it seems to be the latest version although).
2. In your discussion you need to describe the current e-voting procedures in the country you have chosen.
3. Describe, explain and show your understanding of the threats using appropriate terminology from the articles provided (attached as files or links). You may use additional articles to support your report.
a. Explain why you consider these 3-5 threats the most serious or important.
b. Describe suitable controls and mechanisms to mitigate the threats.
c. Use Figure 1 from the article E-government adoption: Architecture and barriers to illustrate where in the security architecture the threats and countermeasures should be implemented.
4. The document should have an appendix with your illustration of where the 3-5 threats and countermeasures can occur in the e-government voting service.
Links:
article 2: (PDF) Secure PKI-enabled e-government infrastructures implementation: the SYZEFXIS-PKI case (researchgate.net)
Wikipedia; public key infrastructure:
Public key infrastructure – Wikipedia