This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Threats and Vulnerabilities

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Threats and Vulnerabilities

In the US, the general election has been encountering issues that pursue to influence the outcome of the polls. These issues turn the integrity of election results against the will of the majority voters hence anticipating and weighing the results to one side (Common, 2018). Information about the voting process can be influenced to misrepresent potential voters and overturn the election outcomes. The election outcomes can be altered either physically or electronically to manuals and electronic tallying methods.  Human errors and lack of proper oversight introduces inaccuracies, and votes count due to fraudulent voting turning elections to be the most affected malicious actors. However, since the election deceitful are cruelly affecting the politics, here are some of the ways that can help to abolish these election malpractices.

The US government can battle the influence of election outcomes that are involved with is involved with vote formulation and cybersecurity. Since there is no precise mechanism that can fully protect election outcomes from cyber-threat freely without system interferences, the US government should contemplate safeguarding the accuracy of election outcomes by avoiding dependence on hardware and software used in conducting election (Von, 2012). Instead, moral auditing practices can determine the results of the vote and reflects accurate outcomes without any necessity to rely on the tackle used in piloting the election.  This action is desirable since it does not alter the election result or the tabulated information to the computer, but it only distinguishes and corrects funded errors habitually.

Concerning e-poll books used during the election, election results can be able to be rehabilitated since they have backed up with paper printouts that form which forms dodge that can modify the results. An in-person voter can create fraud when using the e-poll book in a self-selected locality that relies on these papers due to the primary basement of most people. Indeed, there is a need to build an entirely dependent system that includes independent networks connecting all the polling sites to ensure that every single tally of vote is counted and reflected from all the recognized polling sites.

Lastly, there is a need for the US government to follow the traditional prerogatives that can provide strategies with the best practices concerning the development and maintenance of the voting system. Improvement of the vulnerability of cyber manipulations provides a pathway to these guidelines as compared to other sectors of banking, which invests in using the best security practices as far as cybersecurity is concerned (Common, 2018). The government should consider adaptable election jurisdictions that can restrict the interference of election outcomes through cyber-attacks and hacking of elections systems.

Considerably, the probability of the use of the best practice of election jurisdiction can the more preferable and most effective workout that can save the cost and implementation procedures. This is because the domains touch every corner of the whole election system starting from the cyber threats, configuration, and update of the system, management of operations, and skillful resources used in the order. Testing all these elements, in general, develops a tendency of the managed system hence reducing the risk of successful cyber-attacks (Kohno et al., 2004). A strong defense in cyber-attack cases increases the time and effort required to doctor elections outcomes hence discouraging the attackers. These actions from the jurisdiction overcome prone to all security vulnerabilities and general operation failures since the risk of public confidence in the electoral process is undermined by attempted compromise.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask