The network that the system resides on must be a seize network with dual servers, each in a separate locatio
in the building, for hazard recovery and data verification purposes. All data on the network volition be encrypted, and all files will be password-protected. Neither the voting terminals nor the network servers will be machine-accessible to the Internet, to prevent hacking.
Results will be called in by skirt from the voting location. The system's servers and all terminals will be connected to uninterruptible force out supplies, and in the event of a power outage, all voting data(even votes in progress(will be preserved on hard disk.
Zetter, Kim. (2004). How E-Voting Threatens Democracy. Retrieved on March 14, 2005, from
Security for the system will be gigantic to ensure that there is no vote tampering from outside, by voters, or by voting booth workers. The system will be table-driven in terms of compliance with local voting laws and the candidates for the local area. It will accept table input on a number of different media but only by a designated system administrator who must go done a series of passwords. The system will be written in Java, as C++ is not a secure language; it will not employ or move with any Microsoft software, as that
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
No comments:
Post a Comment