Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 2 de 2
Filter
Add more filters










Database
Language
Publication year range
1.
Risk Anal ; 42(10): 2327-2343, 2022 10.
Article in English | MEDLINE | ID: mdl-35072977

ABSTRACT

Since the reports of Russian interference in the 2016 United States General Election, the security of voting processes has received increased attention from both state and federal authorities. The declaration by the US Department of Homeland Security in January 2017 that election systems be classified as the 17th component of critical infrastructure is just the beginning of a need for more secure voting processes. More recently, the COVID-19 pandemic and the 2020 US General Election have placed greater emphasis specifically on mail-based voting processes for electoral systems. The objective of this research is to provide greater insight into potential threats to mail-based voting processes. Upon identifying an attack tree as an initial structure for evaluation, new threats are postulated, and an updated tree is proposed that accounts for more recent activities. Then, using an established assessment framework, the relative likelihood of each mail-based voting process attack scenario is identified. The results facilitate providing election officials and policymakers with greater knowledge of how mail-based voting system vulnerabilities develop as well as specific security measures that may be most beneficial.


Subject(s)
COVID-19 , Pandemics , United States , Humans , Trees , Postal Service , Politics
2.
Risk Anal ; 39(10): 2119-2126, 2019 10.
Article in English | MEDLINE | ID: mdl-30925207

ABSTRACT

This perspectives article addresses risk in cyber defense and identifies opportunities to incorporate risk analysis principles into the cybersecurity field. The Science of Security (SoS) initiative at the National Security Agency seeks to further and promote interdisciplinary research in cybersecurity. SoS organizes its research into the Five Hard Problems (5HP): (1) scalability and composability; (2) policy-governed secure collaboration; (3) security-metrics-driven evaluation, design, development, and deployment; (4) resilient architectures; and (5) understanding and accounting for human behavior. However, a vast majority of the research sponsored by SoS does not consider risk and when it does so, only implicitly. Therefore, we identify opportunities for risk analysis in each hard problem and propose approaches to address these objectives. Such collaborations between risk and cybersecurity researchers will enable growth and insight in both fields, as risk analysts may apply existing methodology in a new realm, while the cybersecurity community benefits from accepted practices for describing, quantifying, working with, and mitigating risk.

SELECTION OF CITATIONS
SEARCH DETAIL
...