From Paper to Bits
One of the biggest cybersecurity concerns is electronic voting. Paper ballots are increasingly giving way to electronically submitted, tallied, and stored votes. We have seen ways the CIA Triad is applied to electronic messaging, data storage, and account authentication to protect against malicious attacks. However, given the importance and far-reaching implications of election results, electronic voting must adhere to the CIA Triad perhaps more than any other application.
A recent news article, “America’s Electronic Voting Machines Are Scarily Easy Targets,” explores some of the objections to the use of electronic voting in national elections.
You will select one of the components of the CIA Triad (confidentiality, integrity, or availability) and explore its implications for electronic voting. Your group will present to the class on the following:
- How does your chosen characteristic—confidentiality, integrity, or availability—apply to electronic voting? In other words, what would a violation of one of these look like in practice?
- What are the implications of such a violation?
- How might social engineering play a role in an attack targeting this CIA characteristic?
- What is a potential solution? How viable is it? What are the drawbacks associated with it?