* Requirements for secure e-voting There are security concerns with electronic voting, which has been proposed in a number of precincts in the U.S.In general, e-voting systems can include any or all of the following functions, each requiring increasing degrees of security:* Automatic reading and tallying of votes made on paper ballots.* Accepting votes using electronic input devices such as electric pens, touch-screens, and keyboards. * Remote voting at a distance.E-voting systems need to include at least the following security characteristics: 1. Remote voting requires identification, authentication and authorization PLUS guarantees of complete privacy as well as measures to prevent fraudulent exclusion of valid voters and fraudulent acceptance of repeated votes by individuals.2. Electronic data entry should include all the measures developed in the last 40 years of data processing to reduce the likelihood of user error; such measures include:a) Feedback to the user to be sure that what was entered was what was recorded.b) Error checking and alerts to prevent obvious blunders such as voting for two people for the same position if that is not permitted.c) Provision of overrides so that voters can deliberately spoil their ballot if that’s what they want to do.3. Fail-safe redundancy is required so that no single point of failure or even widespread denial-of-service attacks could wipe out voter’s intentions. 4. Cryptographically strong local and remote audit trails are needed to keep multiple independent records of all votes; such files could include checksums that are calculated using the preceding record’s checksum as input to the hashing algorithm (to reduce the ease of fraudulent tampering with the records).One of the most serious questions raised about e-voting is independent of security: it’s the issue of equal access. Will widespread e-voting lead to increased disparity between the voting patterns of richer and poorer people among the electorate? Will e-voting be yet another example of what has been called the “digital divide?”In the next article in this two-part sequence, I will look at some detailed analyses of e-voting with special attention to security. Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe