Coda in the Key of F2654hD4

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

In the story behind the Diebold AccuVote voting machines scandal, what was "F2654hD4?"

a hard coded encryption key

2
New cards

When was the Digital Encryption Standard (DES) deprecated by the National Institute of Standards and Technology?

2005

3
New cards

List three vulnerabilities of the AccuVote source code that were identified by computer scientist Aviel Rubin.

Ballot definition file contained sensitive information

Smartcards used by voters had no cryptography

Election officials all had a default pin of 1111

4
New cards

List two deficiencies in the Diebold AccuVote system identified by Harri Hursti:

Removable memory, easy to-circumvent hardware security

5
New cards

How do Independent Testing Authorities (ITAs) validate voting machines?

if an ITA rejects certification of voting equipment (not likely), other ITAs are enlisted until one approves certification

6
New cards

Why are the ITAs as they're currently configured inadequate to validate election equipment?

Cause they compare their results to previous election records when the system was faulty

7
New cards

Are computing professionals allowed to inspect the source code of voting equipment?

Yes

8
New cards

What is the standard procedure for determining weaknesses/vulnerabilities in source code?

HP Fortify static source code analyzer

9
New cards

List three vulnerabilities of the Diebold AccuVote source code identified by the UC Berkeley computer scientists.

array bounds violations, faulty input validation errors, buffer overruns