- Software and Patch Management
- Log Management
- Network Segmentation
- Block Suspicious Activity
- Credential Management
- Establish a Baseline for Host and Network Activity
- Organization-Wide IT Guidance and Policies
- Notice and Consent Banners for Computer Systems
- Additional Resources
MY GAWD, what a waste of government resources. That Security Tip is nothing more than a generic set of best practices for managing security of any computer network infrastructure.
The complete election system has a number of separate subsystems, some of which can be supported with computer and network systems. A true "election system security guide' would name each of these component process systems and have specific information (no just compete) security advice for each. The basic component processes of any election system are the following:
- Voter registration process system.
- Voter registry record set
- Ballot creation system
- Ballot distribution system
- Voter validity check upon distribution of ballots or appearance at polling place
- Ballot marking process
- Ballot marking recording process (at local polling place or central location after ballot transportation)
- Ballot tabulation process
- Ballot tabulation reporting process
- Ballot tabulation accumulation.
Each of these process needs a system of action, with security processes embedded, preferably using at least the full Parkerian Hexad as the framework for each set of security guides.
Now, anyone want to build out this described "election system security tip?"
(c) 2019 D. Cragin Shelton