How might your approach work together with authentication


Problem

One important concern with an all-electronic voting system is that it does not maintain a "paper trail" of the votes cast. This makes it difficult to audit the election results if a candidate claims that the election was rigged and that someone (or a piece of malware) manipulated the vote tallies. Discuss approaches that will create audit trail that can be reviewed after the election if fraud is suspected. How might your approach work together with some of the authentication technologies?

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: How might your approach work together with authentication
Reference No:- TGS03234786

Expected delivery within 24 Hours