1 A Vision for the Testing of Election Systems in a HAVA World Eric Lazarus

Slides:



Advertisements
Similar presentations
Nishidh, CISSP. To comply with Sarbanes oxley and other legislations To comply with industry standards and business partner requirements To protect.
Advertisements

Test Automation Success: Choosing the Right People & Process
NSAA Information Technology Conference Planning the Scope of Your IT Audit _____________________________________ October 1, 2014 Jennifer Schreck, Audit.
Overview of IS Controls, Auditing, and Security Fall 2005.
Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
B-BBEE VERIFICATION FRAMEWORK.  The BEE Verification process evolved since the release of the B- BBEE strategy in 2003  The dti was requested to provide.
Business Consultants STRATEGIC IMPLEMENTATION MiCase as a consortium “Best Practice” JEFF MILLS, VAN BUREN ISD / HOLLY NORMAN, KALAMAZOO RESA / DON DAILEY,
McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 The Role of Government.
Kpmg Creating Value Through Reporting and Assurance Maria Sillanpää KPMG Sustainability Advisory Services The Copenhagen Centre Conference June
Hands-On Ethical Hacking and Network Defense
Spreadsheet Management. Field Interviews with Senior Managers by Caulkins et. al. (2007) report that Spreadsheet errors are common and have been observed.
Documentation Testing
Testing - an Overview September 10, What is it, Why do it? Testing is a set of activities aimed at validating that an attribute or capability.
Software Asset Management
ISO 9000 Certification ISO 9001 and ISO
Effort Reporting: A Departmental Approach to Meeting Audit Requirements Dianne Valdez, MBA, CIA, CISA, CCSA Enrique Valdez Jr., MBA.
Common Change Management Challenges for Companies Running Oracle Applications Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars.
Best Practices for User Access Controls and Segregation of Duties Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars.
1 Analysys Mason undertook an international programme of customer satisfaction research for a telecoms billing system vendor  A billing systems vendor.
SEC835 Database and Web application security Information Security Architecture.
Commercial Database Applications Testing. Test Plan Testing Strategy Testing Planning Testing Design (covered in other modules) Unit Testing (covered.
SWIS Digital Inspections Project (SWIS DIP) Chris Allen, Information Management Branch California Integrated Waste Management Board November 5, 2008 The.
Software Quality Assurance Lecture #8 By: Faraz Ahmed.
1 Software Testing (Part-II) Lecture Software Testing Software Testing is the process of finding the bugs in a software. It helps in Verifying and.
Demystifying the Independent Test Authority (ITA)
Test Organization and Management
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
Don’t Just “Test”… Validate!!
AUDITS What you should know - a campus perspective. Franz Lozano Director/Budget Officer (former Internal Auditor) San Francisco State University Academic.
EXCiPACT TM EXCiPACT TM International Pharmaceutical Excipients Certification Minimize risks – maximize benefits.
The 3 rd Younger Members Convention Matthew Farraker - Aon Consulting Do We Need Actuaries In A DC World?
Development Review as Economic Development TUESDAYS AT APA – JUNE 25, 2013 MICHAEL BLUE, FAICP – PRINCIPAL CONSULTANT TESKA ASSOCIATES, INC. EVANSTON,
Briefing for NIST Acting Director James Turner regarding visit from EAC Commissioners March 26, 2008 For internal use only 1.
CSCE 522 Secure Software Development Best Practices.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Pertemuan 3-4 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Panel One Why Audit? Mary Batcher Ernst & Young and Chair of ASA Working Group on Elections.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
SWIS Digital Inspections Project Chris Allen, Information Management Branch California Integrated Waste Management Board August 22, 2008.
1 The Evolution of Voting Systems Paul DeGregorio Vice Chairman Donetta Davidson Commissioner The U.S. Election Assistance Commission.
CSCE 548 Secure Software Development Security Operations.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
New England Region Homeless Management Information System PATH Integration Into HMIS Richard Rankin, Data Remedies, LLC Melinda Bussino, Brattleboro Area.
NEUROGEN CORPORATION Alliance Management: View from the Smaller Side of the Alliance Thomas A. Pitler, Ph.D. VP Business Development.
Requisite Skills for IS Management and Interpersonal Skills.
TESTING (S,S,AND A,B) By KARTHIKEYAN KANDASAMY. TESTING Scenario testing – 1.System & 2. Usecase Defect bash System o Functional and non functional testing.
Themes Serious issues to consider, short term and long term Significant commonality in goals among partners WIYN’s capabilities of limited match to department.
Phoenix Technology Solutions Products At the highest level, the products offered by Phoenix Technology Solutions are: IT Project/Programme Management.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Pertemuan 14 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Software Test Plan Why do you need a test plan? –Provides a road map –Provides a feasibility check of: Resources/Cost Schedule Goal What is a test plan?
- 1 - FINAL_NOScript_JDVerificationTraining pptx Job Titles Examples Used for HISD Nonexempt Jobs Assistant: Using knowledge of a functional area(s),
The Suffolk Four – Working Together for the Many Jon Green Dermot O’Riordan Dr Rakesh Raja Dr Andrew Yager.
Internal Audit Agency Integrity + Professionalism INTERNAL AUDIT AGENCY ISACA Presentation 15 July, 2013 Alisa Hotel, ACCRA.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
Midland DHBs Board Development
CPA Gilberto Rivera, VP Compliance and Operational Risk
Test Roles and Independence of Testing
Software Engineering (CSI 321)
An assessment framework for Intrusion Prevention System (IPS)
Service Organization Control (SOC)
FAR (e) “… If a policy or procedure, or a particular strategy or practice, is in the best interest of the Government and is not specifically addressed.
IS442 Information Systems Engineering
Improving Reliability of Direct Recording Electronic Voting Systems
Centre for Disability Studies
George Mason University
Presentation transcript:

1 A Vision for the Testing of Election Systems in a HAVA World Eric Lazarus

2 How Rate a Testing Capability? Transparent Identification Recommendation Cost effective Broad coverage –Reliability –Accessibility –Usability –Security Encourage high- value innovation Pick correct structure given success

3 This is a tough problem 1983 Turing Award Lecture – Ken Thompson showed that conventional methods will fail A Trojan Horse can live in a compiler, linker, loader, interpreter, micro code, BIOS, hardware… Testing is hard and limited

4 Types of Testing Acceptance/Qualification Testing Code inspections/code walk through Concurrency testing Data table testing Disability Access Testing (Variation of usability testing) Installation testing Integration Testing Legal Validation/Verification (Validate legal requirements then verify legal requirements met) Load/Stress Testing Performance testing (test response times) Recovery testing Regression testing Reliability Testing Scalability testing (variation of load/stress testing) Security Testing / Penetration Testing Spike testing (Variation of Load/Stress Testing) Uninstallation testing (variation of installation testing) Unit Testing Upgrade/Patch testing (variation of installation testing) Usability testing

5 Applied Common Sense Vision is not hard to come by Create a vision –What are the questions? –What are common-sense answers? Bring together smart people to think about the obvious vision

6 Q: States Testing Independently? go it alone, or… or Voluntary Consortium of States?

7 Q: States Testing Independently? Voluntary Consortium of States: –Hire more and/or better people –Save $ on duplicated effort –Better shared knowledge gained in Product evaluation Use

8 Q: Who should pay for it? Not vendor funded as with ITA system –Interest clash –Barrier to new entries Pooled state election money What about others including –Political parties –Good government groups –Civil rights groups –Academic institutions

9 Q: Big-Bang or Continuous?

10 Q: Big-Bang or Continuous? Like getting regular checkups Nevada gaming control board takes machines out of service

11 Q: White Box or Black Box? Why handicap our testers by not giving them source? We want to find bugs – source code review is good for this Every branch much be run – too many to realistically be done in voting system software

12 Q: Partisans Included? Brennan Center for Justice projects worked both ways Working with people on both sides of debates has brought out insights Smart and knowledgably is important – such people often have opinions

13 Q: Team must have… Understand election processes Understand computer security techniques Testing in other domains Background from other industries including gaming International perspective Heterogeneous team how do find problems

14 Q: Product Roadmap Can election officials impact product direction via a consortium?

15 Q: Consortium Services? What can they offer?

16 Q: Develop Risk Models Testing should be driven by clear view of the risks testing is attempting to address –“We might buy a machine that is not as accessible as we are told.” –“…not as secure.” –“…not as reliable.” –“…not as easy to administer.” Good to develop and maintain these jointly

17 Q: Shared Repository of Knowledge? What was learned under testing? What was learned in use? What procedures work well with this technology? Model: Information Sharing and Analysis Centers (ISACs) e.g., Financial Services Information Sharing and Analysis Center

18 Q: Evaluating Election Procedures? Could this same team evaluate procedure manuals? Should be able to evaluate procedures against best practices

19 Q: Testing When? Product Evaluation Certification Acceptance Logic & Accuracy Continuous

20 Q: Other services? Negotiate joint purchasing agreements (like GSA Schedule) –Products –Services Transparency: Arrange for purchasable by responsible organizations Encourage innovation by –Adhering to open standards

21 Q: Make policy? Should such consortia of states do testing and provide testing information or should they take on policy making role?

22 Q: Make policy? Should such consortia of states do testing and provide testing information or should they take on policy making role? –I’ve been assuming that these staff would make no policy but only provide the results of their tests. They would not, for example, certify or decertify machines but would report on results of testing.

23 So one vision emerges Multiple states group into a consortium (or two) Has own staff and/or consultants, small contractors, academics Performs Testing for: –Usability –Security Evaluates –Procedures –New technology –Cost

24 Does this make sense? Very interested in collaborating around a proposal to create a consortium How can we improve this vision? Please contact me if you want to work on this

25 Testing is not an end in itself Current State GOAL= Improved Elections Testing Skills Authority Resources Commitment

26 Illustration: Gaming – What’s Different? Ladder of trust with signed firmware at bottom Multiple people with different keys Field trails as part of certification Hash compare in the field randomly every two years Auditing the auditors Certification done by government employees willing to share/discuss their methods Post-employment restrictions on working for vendors Penalties for messing up Assumption of cheating