Approved-online-essay-writers

A General E-Voting Architecture & Risk Analysis – IT Computer Science Assignment Help

Assignment Task


Task 

Figure 1 A general e-Voting architecture (adopted from [1]) 

Figure 1 A general e-Voting architecture (adopted from [1]) 

A-Plus Writing Help For University Students

Get expert assistance in any academic field. All courses and programs covered.

Get Help Now!

Figure 1 depicts a general e-Voting scenario. The polling station consists of Authentication and Registration Server (ARS) and Counting Server (CS) which are connected with ballot boxes as well as registration and voter status computers. Internet voters are also able to vote by directly connecting to the ARS using a VPN. The Central Election Commission server holds all voter data including fingerprint data. Under this proposed approach the fingerprint data are pre-recorded during registration of the national ID card (or passport). The proposed model uses these fingerprint data for voter authentication. Each polling station receives from the CEC their respective voting list, which also contains the fingerprint data. The Counting Server has a X.509 digital certificate and its associated private key is generated and stored in a smart card. The Counting Server’s public and private keys are each 2048 bits long. The private key never leaves the smart card and access to it is protected by a Personal Identification Number (PIN). 

The key security requirements for the e-Voting system are confidentiality and integrity of the votes, and availability of the e-Voting system. 
 

Using the CORAS approach of risk analysis, you will be required to identify and model applicable risks using Asset, Threat, Risk, Treatment, and Treatment Overview diagrams Please ensure the following deliverables are met in your submission: 

1. Set the scope and focus.
2. Describe the target (goals of analysis, target in use, business or organisation views of the target).
3. Understand assets and parties with their respective relationships (asset diagram).
4. High-level analysis of a list of unwanted incidents, threats, vulnerabilities, and threat scenarios.
5. Ranked list of assets, scale of risks, risk function and risk evaluation metrics.
6. Risk identification and estimation using the threat diagram.
7. Risk evaluation using risk diagram, including acceptable risks for further evaluation for treatment.
8. Risk treatment using treatment diagram. 

This IT Computer Science Assignment has been solved by our IT Computer Science Expert at TV Assignment Help. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing Style. Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. 

You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turn tin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Welcome to our Online Essay Writing Agency. Securing higher grades costing your pocket? Order your assignment online at the lowest price now! Our online essay writers are able to provide high-quality assignment help within your deadline. With our homework writing company, you can order essays, term papers, research papers, capstone projects, movie review, presentation, annotated bibliography, reaction paper, research proposal, discussion, or another assignment without having to worry about its originality – we offer 100% original content written completely from scratch

We write papers within your selected deadline. Just share the instructions

PLACE YOUR ORDER