Question

Maintaining the people's trust in states' voting systems is just as important as securing the hardware...

Maintaining the people's trust in states' voting systems is just as important as securing the hardware or software of these systems. What are some ways the U.S. can maintain or reestablish trust in voting systems when the people are already becoming wary of the security of the systems and the legitimacy of the vote

0 0
Add a comment Improve this question Transcribed image text
Answer #1

In a democratic republic like US it is important to administer free and fair election in order to gain the consent of the governed. In 2016 this democratic process came under attack. Unfortunately the election infrastructure of US is ill prepared for future elections, and this is the reason of lost people’s trust in voting system. Out dated voting machine, lack of verified paper ballots or records and inadequate cyber security measures for voting machines and database are the few vulnerabilities that are leaving US elections open for attack. Protecting of election is a matter of national security and should be acted immediately. The support from all level of government should be given to achieve this.

Following are the few steps that can be followed in order to gain the people’s trust in voting system-

  1. Replacement of old voting machines with the error free new one.
  2. Conducting robust postelection audits in order to confirm election outcomes.
  3. Usage of voter verified paper ballots for every vote cast.
  4. Implementing cyber security standards for voter registration systems.
  5. Mandatory pre-election testing of all the voting machines and alsp performing continuous vulnerability analysis.
Add a comment
Know the answer?
Add Answer to:
Maintaining the people's trust in states' voting systems is just as important as securing the hardware...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Everybody knows that email is important, but should each company develop, own, support, and maintain its...

    Everybody knows that email is important, but should each company develop, own, support, and maintain its own email infrastructure, or should it instead use lower-cost or free services? That is the question that Michael Jagger, CEO of Provident Security, faced as he contemplated a costly upgrade of the company’s internal email infrastructure. Founded in 1996 by Michael Jagger as a way to pay his undergraduate tuition, Provident started out as a company that provided special event security. Today, it has...

  • Information systems questions Business Processes and Information Systems: Mini case: A customer just visited his doctor...

    Information systems questions Business Processes and Information Systems: Mini case: A customer just visited his doctor and got a prescription. The prescription is about getting one medicine which has one refill. Assuming you are a manger in a pharmacy where this customer will fill the prescription. Q1, Please break the pharmacy IS (information system) business process (starting from the time point when a prescription arrives at your pharmacy to the time point when this customer receives all the medicine including...

  • all are mcq no need of explanation just answer mcq Information about other people's identity based...

    all are mcq no need of explanation just answer mcq Information about other people's identity based on visible physical characteristics is referred to as: * O b. self-disclosure O c. line of sight O a relational learning. O d. cognitive consistency. In what ways are intercultural relationships similar to intracultural relationships? * b. They take the same basic amount of work and effort. O c. They pass through the same developmental stages. a. There is a similar amount of anxiety...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • The information systems (IS) department at Jacobsons, Inc., consists of eight employees, including the IS Manager, Melinda Cullen. Melinda is responsible for the day-to-day oversight of the IS functio...

    The information systems (IS) department at Jacobsons, Inc., consists of eight employees, including the IS Manager, Melinda Cullen. Melinda is responsible for the day-to-day oversight of the IS function and reports to Jacobsons' chief operating officer (COO). The COO is a senior vice president responsible for the overall retail operations who reports directly to the president and chief executive officer. The COO attends board of director meetings to provide an update of key operating performance issues. Because Melinda takes an...

  • THE WAR ON ALLERGIES SUPPOSE THAT 54.3 PERCENT of your country's population had cancer. That figure...

    THE WAR ON ALLERGIES SUPPOSE THAT 54.3 PERCENT of your country's population had cancer. That figure might set off a nationwide panic-a search for something wrong with people's diet, the environment, activity levels. In fact, that's the percentage of Americans who show a positive skin response to one or more allergens. A1 5 B The manifestations' of allergy-sneezing, itching, rashes-are signs of an une system running amok,2 attacking foreign invaders-allergens- that mean no harm. Allergens include pollen, dust mites, mold,...

  • Stroke A stroke is serious, just like a heart attack, so it's important to know the...

    Stroke A stroke is serious, just like a heart attack, so it's important to know the signs of stroke and act quickly if you suspect someone is having one. Stroke is the fourth leading cause of death in the United States, and causes more serious long-term disabilities than any other disease. Older people are at higher risk. You can take steps to lower your chance of having a stroke. Know the Signs of Stroke Knowing the symptoms of a stroke...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT