Official (ISC)2 Guide to the CISSP CBK ((Isc)2 Press Series)
Official (ISC)2 Guide to the CISSP CBK ((Isc)2 Press Series)
The Dynamics of Counting and Recounting Votes
IEEE Security and Privacy
Applying a reusable election threat model at the county level
EVT/WOTE'11 Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections
E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems
International Journal of Information Security and Privacy
Comparing risk identification techniques for safety and security requirements
Journal of Systems and Software
Hi-index | 0.00 |
There continues to be a requirement for better models, tools, and techniques for conducting risk assessment of voting systems. We propose a model of risk and a technique for risk assessment, which builds on threat trees and Monte Carlo simulation. The goal is to provide a means of facilitating informed decisions regarding voting system security standards through a rational and parsimonious quantification of intuition or estimation of risk. Such a means should support an evaluation of trade-offs, sensitivity analysis, cost-benefit analysis, and estimation of residual risk of current and proposed voting systems, technologies and controls.