Volume 4

V4 N1 Pages 4-16

April 2011


A Process for Assessing Voting System Risk Using Threat Trees


Alec Yasinisac
University of South Alabama
Mobile, AL 36688, USA

J. Harold Pardue
University of South Alabama
Mobile, AL 36688, USA

Abstract: Security continues to be a critical issue in the safe operation of electronic voting machines. Risk assessment is the process of determining if a particular voting system is at risk and what steps can be taken to mitigate the risk. We propose an iterative risk assessment process using threat trees. This process involves using a voting system risk taxonomy to categorize a threat, a schema to express logical hypothesis about a threat, generating a threat tree through functional decomposition, expressing threat instance semantics as nodal properties with metrics, validating the threat instance through independent representations, and finally pruning the tree for enhanced usability and understandability. This process provides guidance to an analyst in using threat trees to conduct risk assessment of electronic voting systems. Because this process is based on abstract and extendable structures, it facilitates the comparison and validation of independent risk evaluations. Prospective voting system risk assessment metrics are provided.

Keywords: electronic voting systems, risk assessment, taxonomy, threat trees

Download this article: JISAR - V4 N1 Page 4.pdf


Recommended Citation: Yasinisac, A., Pardue, J. (2011). A Process for Assessing Voting System Risk Using Threat Trees. Journal of Information Systems Applied Research, 4(1) pp 4-16. http://jisar.org/2011-4/ ISSN: 1946-1836. (A preliminary version appears in The Proceedings of CONISAR 2010)