Abstract
This work represents a comprehensive investigation into election systems security in particular and enterprise information systems security in general. It is organized into three interrelated parts: the development of a security architectural framework, the development of a security metric, and the security measure of an election system. In this work, election systems are characterized as enterprise, and concepts developed for enterprise architecture are applied to them. Since modern election systems rely on information technology and related systems, the security of these systems is essential to the security of the election systems. Unfortunately, the security of information systems is subject to misassessment and mischaracterization. Thus the development of a holistic measure of security for information systems is critical to the design of a secure election system. In this work an architectural framework for information systems security design is developed based on well defined information security components and requirements. The components defined in the framework serve as foundation for a security measure. The development of the architectural framework is the outcome of paradigm shift in the design of enterprise architectures where the security of the resulting system is the core objective. The framework highlights interactions among architectural components, which interactions also affect the security of enterprise information systems. These interactions are captured in the development of the security measure. The security measure is developed by utilizing well grounded mathematical techniques from financial econometrics, financial engineering and related field. The metric development adopts techniques from measure theorem and multivariate distribution analysis to develop a measure that is consistent and complete. The utility of a holistic security architectural framework is demonstrated in the analysis of an election system, characterized by the framework. The security of an illustrative election system is also computed to demonstrate the utility of the developed security metric. This work thus addresses the two fundamental requirements for a comprehensive security design for any enterprise, including an election system.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.