SEWER security in an online SEWER sysytem VIVIAN NJERI WAHU CT101/G/15392/21 MR KIRORI
INTRODUCTION The advent of online voting systems has the potential to revolutionize the way elections are conducted, offering convenience, accessibility, and efficiency. However, these advantages come with significant challenges, particularly in ensuring the security, privacy, and integrity of the voting process. In an age where cyber threats and digital fraud are increasingly prevalent, securing i n online voting system is paramount to maintaining public trust in electoral processes. Implementing robust security measures is essential for preventing various types of cyberattacks, such as identity theft, vote tampering, and denial of service attacks. It is also critical to ensure the privacy of voters, protect their personal data, and maintain the confidentiality of their votes. Moreover, security measures should guarantee that only eligible voters can participate, that each vote is counted accurately, and that the voting process is transparent and verifiable.
PROBLEM STATEMENT Online voting has been faced with numerous cyber threats that affect the voting process. Some of these cyber threats include session hijacking in which an attacker will tend to pose as a verified user and vote on behalf of that user using his or her account and thus affecting the integrity of the votes. A denial of service attack can also be imposed on these voting systems making the server requests slow and this may affect availability of data and also make voters impatient. A database attack may tend to expose crucial data about users and votes hence making confidentiality compromised. A database attack may also make users get locked out of their account and all data may be lost. An attacker may also perform a remote code execution attack making it possible for the attacker to gain access to secret API keys. This can jeopardize an entire system and it vulnerable to ransomware. A man in the middle attack may bring about vote compromization as the attacker can be able to change the contents of the votes.
OBJECTIVES General Objective To develop a secure web based voting system. Specific Objectives The specific objectives of the project include the following: To collect data useful in creation of a secure voting system. To create designs for the voting system. To code and implement the voting system. To test the online voting system.
LITERATURE REVIEW Theoretical Review Zissis (2021) defines cyber security as the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. Zissis (2021) also defines a cyber-attack as any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage. Cyber-attacks aim to disable, disrupt, destroy or control computer systems or to alter, block, delete, manipulate or steal the data held within these systems. Pillars of Cyber Security In cybersecurity, Kobie (2020) refers to the pillars of cybersecurity as concept that focuses on the balance between the confidentiality, integrity and availability of data under the protection of your information security program. This concept has emerged over the past two decades as a key guide for information security professionals as it helps direct efforts, spend and hours when trying to create and optimize a cybersecurity program and align it to the needs of the business.
METHODOLOGY Rapid Application Development I chose to use Rapid Application Development, which is a methodology that enables organizations to develop strategically important systems faster while reducing development costs and maintaining quality. Therefore, unlike other software development models, such as the waterfall model, very limited planning was required to get started with the project. Phases of Rapid Application Development JUSTIFICATION OF THE METHODOLOGY Reduced risk of failure Security testing User-centered design Requirements Planning User Design Construction Implementation
Stages of rad Requirements Planning This phase involved the collection of data for designing the system. Some of the data collection tools used were interviews and questionnaires which were very efficient. User Design At this stage, I created designs and mock-ups for the web based voting system. I chose HTML and CSS for my design tools. Construction During the development stage, I focused on two main sections. The frontend and backend section. The backend part was written in Python and the frontend part was written in HTML and CSS. Implementation At the final stages,it was necessary to code the backend logic for handling user authentication,form submissions and other business logic using python.For frontend -backend communication,I established fetch API requests to send data from the frontend(HTML) to the python backend.A unit test was conducted using python’s unnitest for quality assurance and also validate the compatibility and responsiveness of the HTML/CSS frontend across different devices and browsers
REFERENCES Alex, H. (2020). The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election. Carsten, S. (2021) Computer Security in Modern Systems. DemTech Group Feldman, H. (2021). Security Analysis of the Diebold AccuVote -TS Voting Machine . Usenix . Germann, M; Serdült , U. (2020). Internet voting and Security Malpractices: Evidence from Switzerland. Electoral Studies. 47 : 1–12. Gurchetan S.G, Mark D.R, Sergiu B, Peter Y.A.R. (2020). Caveat Coercitor : malicious spyware actions in electronic voting. 34th IEEE Symposium on Security and Privacy, 2013