1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
In the story behind the Diebold AccuVote voting machines scandal, what was "F2654hD4?"
a hard coded encryption key
When was the Digital Encryption Standard (DES) deprecated by the National Institute of Standards and Technology?
2005
List three vulnerabilities of the AccuVote source code that were identified by computer scientist Aviel Rubin.
Ballot definition file contained sensitive information
Smartcards used by voters had no cryptography
Election officials all had a default pin of 1111
List two deficiencies in the Diebold AccuVote system identified by Harri Hursti:
Removable memory, easy to-circumvent hardware security
How do Independent Testing Authorities (ITAs) validate voting machines?
if an ITA rejects certification of voting equipment (not likely), other ITAs are enlisted until one approves certification
Why are the ITAs as they're currently configured inadequate to validate election equipment?
Cause they compare their results to previous election records when the system was faulty
Are computing professionals allowed to inspect the source code of voting equipment?
Yes
What is the standard procedure for determining weaknesses/vulnerabilities in source code?
HP Fortify static source code analyzer
List three vulnerabilities of the Diebold AccuVote source code identified by the UC Berkeley computer scientists.
array bounds violations, faulty input validation errors, buffer overruns