Election security

Get Started. It's Free
or sign up with your email address
Election security by Mind Map: Election security

1. Security

1.1. Security Standards

1.1.1. Mitigation

1.1.1.1. Hacking

1.1.1.2. IT Strategy

1.1.1.3. Cyber attacks

1.1.1.4. Leverage authority

1.1.2. Technical Failures

1.1.2.1. Vulnerability

1.1.2.2. Integrity against fraud

1.1.3. Accurate reporting

1.1.3.1. Audit protection

1.1.3.2. Risk identification

2. Trust

2.1. Public

2.1.1. Empowerment

2.1.1.1. Integrity

2.1.1.2. Belief

2.1.1.3. Voter education

2.2. Private

2.2.1. Accountability

2.2.1.1. Election Audits

2.2.1.1.1. Does every vote count?

2.2.1.2. Fraud

2.2.1.3. Accuracy

2.2.2. Transparency

2.2.2.1. Misinformation

2.2.2.2. Disinformation

3. Infrastructure

3.1. Procurement

3.1.1. Proper bid selection

3.1.1.1. Secured

3.1.1.1.1. No foreign interference

3.2. Updated machines

3.2.1. Designed procedures

3.2.2. Infrastructure responsibilities

3.2.2.1. Proactive

3.2.2.2. Reactive

3.2.2.3. Reinforce

4. Machine and Systems

4.1. Voting methods

4.1.1. polling place

4.1.2. accessible voting

4.1.3. early voting

4.1.4. absentee

4.1.5. provisional ballot

4.2. Technology

4.2.1. Sustainable

4.2.2. Coordination

4.2.3. Proper funding

4.2.4. Contingency planning