• Facebook
  • Utilizator nou
  • Logare
  • Iesire
  • Parola pierduta
  • Contact
  • Română Română Română ro
  • English English Engleză en
Revista Polis
  • Acasa
  • Redactia revistei
  • Numar curent
  • Reguli de redactare
  • Arhiva revista
    • 2023
      • Numarul 1(39)/2023
    • 2022
      • Numarul 4(38)/2022
      • Numarul 3(37)/2022
      • Numarul 2(36)/2022
      • Numarul 1(35)/2022
    • 2021
      • Numarul 4(34)/2021
      • Numarul 3(33)/2021
      • Numarul 2(32)/2021
      • Numarul 1(31)/2021
    • 2020
      • Numarul 4(30)/2020
      • Numarul 3(29)/2020
      • Numarul 2(28)/2020
      • Numarul 1(27)/2020
    • 2019
      • Numarul 4(26)/2019
      • Numarul 3(25)/2019
      • Numarul 2(24)/2019
      • Numarul 1(23)/2019
    • 2018
      • Numarul 4(22)/2018
      • Numarul 3(21)/2018
      • Numarul 2(20)/2018
      • Numarul 1(19)/2018
    • 2017
      • Numarul 4(18)/2017
      • Numarul 3(17)/2017
      • Numarul 2(16)/2017
      • Numarul 1(15)/2017
    • 2016
      • Numarul 4(14)/2016
      • Numarul 3(13)/2016
      • Numarul 2(12)/2016
      • Numarul 1(11)/2016
    • 2015
      • Numarul 4(10)2015
      • Numarul 3(9)2015
      • Numarul 2(8)2015
      • Numarul 1(7)/2015
    • 2014
      • Numarul 4(6)/2014
      • Numarul 3(5)/2014
      • Numarul 2(4)/2014
      • Numarul 1(3)2014
    • 2013
      • Numarul 2/2013
      • Numarul 1/2013
    • Seria veche
  • POLIS+
    • Emisiuni 2017
      • 27 Octombrie 2017
      • 20 Octombrie 2017
  • Media
    • Evenimente
      • Constitutia 2013
    • Emisiuni
      • Constitutia 2013
    • Forum
    • Seria Polis
  • Anunturi
  • Cautare
  • Menu
Slide background

Journal of The Faculty of
Political and Administrative Sciences

Descarca articol PDF

Coordonat de Elias VAVOURAS

Volum IX, Nr. 3 (33), Serie nouă, iunie-august 2021

Cybersecurity Considerations in the Elections

 

Adrian-Viorel DRAGOMIR,

Anca MITU

Abstract: Digital technology is changing people’s lives, and the digitization strategy that is desired at the governmental level in the European Union aims to make this transformation work for people, public institutions, and companies. Information protection has become a significant challenge for many institutions. They want to make sure that no one can steal or compromise what data and information they have. One of the new pressing problems that must be solved when implementing modern technologies is the protection of information that is not intended for the general public. The complexity of this issue is increasing in the context of the application of personal data protection legislation. In order to respond effectively to the desire to constantly improve the electoral process, Electoral Management Bodies must take measures to improve administrative processes in the sense of simplifying, digitizing and professionalizing staff, which are the new trends in public administration management. The paper examines the most important reforms that electoral management bodies have to make, in line with the new models of the public sector and proposes a new vision on cyber security, to be adopted within them.

 

Keywords: Innovation; Digitalization; Security measures; ICT; Strategy; Information technology.

 

 

Introduction

Since 2018, a number of ini­tiatives have been launched at the level of electoral management insti­tutions in the European Union to secure elections of the European Parliament at national level, fol­lowing the recommendations of the European Commission for Demo­cracy by Law of the Council of Europe (“the Venice Commission”). Working closely with the Electoral Management Bodies in its 61 Member States and dedicated its annual conference in 20181 to cyber security of the information systems that are used in the elections. The recommendations addressed a unified approach to the security of the elections, in particular by focusing attention on remote voting with a view to strengthening citizens’ parti­cipation in voting, especially in the context of the coronavirus pandemic.

Bearing in mind that electoral processes throughout the country involve the use of IT tools at all stages dedicated to preparing, recor­ding, counting and/or centralizing results, it is necessary to raise the level of preparedness and security of these events so as not to jeopardize the integrity of the electoral proces­ses as a whole.

The right of voters to participate in elections in a direct, free and secret universal suffrage means that they are not prevented from voting, that their votes are not falsified, the op­tions are not disclosed prematurely, and the electoral process is not cheated by cyber-attacks or other information technology.

Cyber threats, sometimes com­bined with disinformation as well as other hybrid threats, can become a reality in electoral processes and thus need to be aware of and reflected in planning assumptions and risk management when designing and implementing IT systems that will provide operational support in elections.

As with any new solution, IT&C technology used in the electoral pro­cess must be introduced with caution, while ensuring that the digital solu­tions to be used meet the same legal requirements for elections as the other traditional non-digitized solu­tions, respectively, free, open elec­tions, correct and based on secret ballot. While respecting these funda­mental principles, technology can make a beneficial contribution to elections by complying with the general democratic rules set out in constitutional or electoral law.

 

 

CONTENT

 

Trust in the electoral process is fundamental to ensuring the legiti­macy of the results and to ensure compliance with this principle, the electoral management authority must take the following measures2 [2]:

  • public oversight, together with en­tities responsible for ensuring and maintaining cyber security;
  • observation of elections, including training of observers in electoral technology;
  • publishing full documentation and allowing controlled access to the technology used in the elections, to demonstrate the truthfulness of results and increase the trust in the process;
  • viewing and publishing the voter turnout and the results of the elections in a way that is accessible and understandable to the public;
  • open communication of cyber security risks before and during elections;
  • educating voters and building pu­blic trust in election technologies;
  • involvement of key opinion leaders to present the benefits of techno­logy in elections;
  • improving relations with media representatives and educating jour­na­lists in the field election techno­logies;
  • building trust among cyber security experts, raising awareness and involvement of experts in testing systems that are used in elections.

The occurrence of cyber-security incidents during the elections could significantly disrupt the democratic process in general and lead to a loss of credibility of the democratic elec­toral system, of the electoral mana­gement bodies and of the parties participating in electoral campaigns. Major incidents or incidents that are most likely to happen may pose the following threats3:

  • unauthorized access to the IT in­frastructure or loss of legitimate access to it;
  • manipulation or falsification of the registration process of voters or the members of election commissions for counting votes;
  • modification or theft of data, including sensitive data that may change the results of the electoral process. In order to ensure the im­ple­mentation of the principles set out above, detailed cyber security checks are needed to ensure the integrity of all the software com­ponents or devices used in the elections, including:
  • check the firmware to be updated;
  • management and traceability of changes in technical configuration;
  • continuous and adequate moni­toring of network traffic to provide a real-time analysis of security alerts generated by network appli­cations and hardware;
  • implement a comprehensive secu­rity information and event mana­gement (SIEM) solution to look for malicious activities using the logs provided by the hardware and software systems and send alarms to their administrators;
  • ensuring strong protection against DDoS – denial of service attacks are an important part of all attacks against electoral technology, in terms of protection of platforms used to collect electoral information or publish results. Denial of service is usually achieved by loading the target machine or resource with unnecessary requests in an attempt to prevent certain legitimate de­mands from being met;
  • access control – identification and control of users who have access to data or system and application privileges;
  • strong authentication based on the following principles: something that the user knows (passwords), what the user owns (token, mobile applications, smart-cards) or some­thing that the user is (biometrics);
  • checking data integrity and se­curing data transfer – data transfers are potential trade-offs, control amounts and digital signatures being useful tools to ensure data integrity;
  • ensuring the segmentation of the network used for computer systems supporting electoral processes, by logical separation (VLAN) or by physical separation, which will ensure that processes that do not have to be accessible to the public, in particular centralization and coun­ting of votes, can take place in an environment physically isolated from other public trials;
  • ensuring back-up and recovery tools and procedures of the data from central systems that must be installed in secure locations where physical access will be verified and restricted;
  • ensuring an alternative location that allows data recovery and business continuity in the event of disrup­tions of any kind, with equipment suitable for this activity pre-reserved and ready for use at any time and complying with the same standards and requirements as the initial system;
  • duplication of secured communi­cation channels.

In order to be prepared to prevent cyber security crises, the EMBs should call for the creation, at govern­mental level, of working groups with expertise in cybersecurity, on the one hand, and in electoral technologies, on the other hand, with the purpose to draw up instructions and methods for preparing and protecting the com­puter systems to be used in elections and to ensuring interinstitutional cooperation in this field throughout the election period.

This working groups should have a 24/7 format support program during election periods, and the main tasks include coordinating cyber defense and managing crisis events. The working groups should be composed of technical staff with knowledge, certification and duties in techno­logies and equipment’s cybersecurity protection at the level of electoral management bodies, institutions in­vol­ved in protecting cybersecurity, and the national governmental teams acting as computer security incident response team (CSIRT), at state level4.

The main roles to be given to the working groups are the testing and auditing of information systems and communication networks supporting electoral processes, which are con­sidered as the cornerstones of cyber security and the only means of ensuring functionality and security. Therefore, testing and auditing should be adopted as comprehensive multi-faceted approaches, with criti­cal systems to be tested for pene­tration by at least two independent teams and the connections between applications to be deep analyzed.

During election periods, working groups will have to carry out func­tional tests and loading IT systems tests, which should focus on the system’s responses, in the sense of giving the expected and correct response to the data processing.

System security tests must be carried out, which will focus on ensuring that information systems cannot be compromised by changing their parameters that will make them act in undesirable or altered ways. The problem with these functional tests is that there is often an endless list of scenarios and circumstances to test to see if the system is performing in a faulty way, limiting their effec­tiveness.

Another set of tests that work­groups need to perform are vulne­rability scans, which are specific and simplified forms of security testing for known cyber vulnerabilities, which are globally documented by all companies and entities working in the field of cyber security.

Vulnerability scans are made with software developed specifically for such activities that have in place universally recognized vulnerability libraries that all these companies keep up-to-date. These tests are gene­rally useful for testing the security of communication, processing and data storage infrastructures.

It is impetuous to do penetration tests combined with other types of security tests and audits at the level of the organization. This is one of the final security tests, which are done with experienced testers, allowed to try to attack the information and network systems used in electoral processes, by any means necessary, to demonstrate how safe they are.

In these extensive and creative tests, testers are trying to imitate real attackers using multiple combina­tions and attack methods. These tests can be very useful to reveal the weaknesses of the system in its entirety, in terms of system organi­zation, system configuration, network connections and ancillary systems, on the one hand, and training of the institution’s officials in the field of social engineering and false news, on the other. The tests results depend on the creativity and abilities of the testers, and their final reports can propose solutions to improve the cybersecurity system by reducing the number of vulnerabilities, especially those known.

In setting up the working groups, the following principles shall be taken into account, documented and disseminated to all actors involved in the conduct of the activities, through documents and procedures5 [5]:

  • provide a single point of contact at national level where it is possible to report cyber security incidents and which be able to mitigate, respond and deal with an attack quickly;
  • create of a scale of crisis escalation that can detail the type and critic level of an attack;
  • creating a clear division of roles and responsibilities;
  • creating secure means of communi­cation;
  • ensuring full documentation of the systems that are used as support for electoral processes;
  • ensuring the flexible allocation of resources, both financial and human;
  • an adequate training plan for all members of the groups.

Conclusions

In this complicated geo-political context, security challenges have changed in all direction, now pre­senting quite different aspects com­pared to a few years ago. So, cyber security in elections must be ad­dressed with responsibility and caution, and a lot of work needs to be done to keep this area up-to-date and to improve it on a continuous basis.

Thus, in order to better understand and implement this concept and ef­fec­tively defend against this scourge, long-standing partnerships must be signed with all the states institutions and private that act as operational centers to respond to cyber security incidents in order to monitor in real time, analyze the impact, respond promptly to cyber security incidents and verify the security level of the products or information systems to be used in elections.

A very important aspect to consider is the training of the staff that is responsible for cybersecurity. Information is necessary to ensure the security of information systems and to be know the last methods of attack, officials should regularly par­ticipate in cyber security technology training, product or service presenta­tions, colloquia and cyber-attack and defense simulations. Only in this way the employees that are responsible with security will be informed in this highly dynamic area and will be aware of the real threats posed by cyber terrorism to the electoral field.

 

Notes

 

  • Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certifi­ca­tion and repealing Regulation (EU) No 526/2013 (Cybersecurity Act), https://eur-lex.europa.eu/legal-con-tent/EN/TXT/?uri=uriserv%3AOJ.L_.2019.151.01.0015.01.ENG&toc=OJ%3AL%3A2019%3A151%3ATOC, website consulted on 11.03.2021.
  • Whitman, M. E., & Mattord, H. J. (2019), Management of Information Security (6 ed.). Boston, Maryland, United States of America: Cengage Learning, pp. 4-8.
  • Briony, J.O. (2003), The potential contribution of ICT`s to political process. Electronic Journal of e-Government, vol. 1, no. 1, pp. 33-42.
  • Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and infor­mation systems across the Union, https://eur-lex.europa.eu/legal-con-tent/RO/TXT/PDF/?uri=CELEX:32016L1148&from=RO, website con­sulted on 02.03.2021.
  • European Council conclusions on cyber activities in 2018, https://data.consilium.europa.eu/doc/document/ST-7925-2018-INIT/ ro/pdf, website consulted on 20.02. 2021.

 

Bibliography

WHITMAN, M. E., & MATTORD, H. J. (2019), Management of Information Security (6 ed.). Boston, Maryland, United States of America: Cengage Learning, 2019, pp. 4-8.

BRIONY, J.O. (2003), „The potential contribution of ICT`s to political process”, Electronic Journal of e-Government, vol. 1, no. 1, 2003, pp. 33-42.

Electronic Resources

Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cyber­se­curity certification and repealing Re­gulation (EU) No 526/2013 (Cyber­se­curity Act), https://eur-lex.europa.eu/ legal-content/EN/TXT/?uri=uriserv% 3AOJ.L_.2019.151.01.0015.01.ENG&toc=OJ%3AL%3A2019%3A151%3ATOC, website consulted on 11.03. 2021.

Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union, https://eur-lex.europa.eu/legal-content/RO/TXT/ PDF/?uri=CELEX:32016L1148&from=RO, website consulted on 02.03.2021;.

European Council conclusions on cyber activities in 2018, https://data.consilium.europa.eu/doc/document/ST-7925-2018-INIT/ro/pdf, website consulted on 20.02.2021;

Articole recente

  • Editorial. Populismul – o tehnică de propagandă5 decembrie 2017 - 15:13
  • Europa şi ameninţarea populistă5 decembrie 2017 - 15:03
  • Populismus in Deutschland, und die Auswirkungen auf die Bundestagswahl 20175 decembrie 2017 - 14:45
  • Populismo e neoliberismo5 decembrie 2017 - 14:30
  • Populism and gender5 decembrie 2017 - 14:26

Indexari

IndexariIndexari

Cele mai vizualizate articole

  • Campania electorală în teritoriu: aspecte empirice ale marketingului politic
  • România în Primul Război Mondial
  • Dinamica demografică în perioada post-1945 și implicațiile ei (geo)politice
  • Citi oameni a omorit comunismul? Si cine erau ei?* (How many people did communism kill? And who were they?)
  • Dimensiunea mediatică a populismului în România contemporană

Accesari site

Formulare (Forms)

Cerere tip - Descarca
Authors must send a request - Download
Contractul de editare - Download
Editing contract - Download
Formularul de cedare a drepturilor catre autori - Download
Copyright License Agreement - Download

Ultimele articole (Latest articles)

  • Queen Elizabeth II and The Commonwealth – Her Role and Legacy9 martie 2023 - 19:47
  • ‘Protector of Thy Church and People’: Her Late Majesty Queen Elizabeth II and the Established Church of England9 martie 2023 - 19:47

Contact

Str. Dimitrie Mageron, nr. 49, Iaşi, Romania
Tel. 0040 232 214 858
Fax: 0040 232 214 858

Ne puteti scrie la adresa redactia@revistapolis.ro.

© Drepturi de autor - Revista Polis - Universitatea "Petre Andrei" din Iasi - powered by Enfold WordPress Theme
  • Facebook
Scroll to top