{ "authors": [ "NIS Cooperation Group" ], "category": "guidelines", "description": "Universal Development and Security Guidelines as Applicable to Election Technology.", "name": "Election guidelines", "source": "Open Sources", "type": "guidelines", "uuid": "c1dc03b2-89b3-42a5-9d41-782ef726435a", "values": [ { "description": "Tampering with registrations", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:setup | party/candidate-registration" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "32b3ce0a-0427-452c-9e35-26bf5a682786", "value": "Tampering with registrations" }, { "description": "DoS or overload of party/campaign registration, causing them to miss the deadline", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:setup | party/candidate-registration" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "154c6186-a007-4460-a029-ea23163448fe", "value": "DoS or overload of party/campaign registration, causing them to miss the deadline" }, { "description": "Fabricated signatures from sponsor", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:setup | party/candidate-registration" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "f4f1ddcb-f067-4136-ba4d-f1d1a2707485", "value": "Fabricated signatures from sponsor" }, { "description": "Identity fraud during voter registration", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:setup | electoral-rolls" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "23dbb998-db8a-4cd4-90ab-ce6e8a9abe4b", "value": "Identity fraud during voter registration" }, { "description": "Deleting or tampering with voter data", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:setup | electoral-rolls" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "12677906-eec5-42ff-b785-db4097115648", "value": "Deleting or tampering with voter data" }, { "description": "DoS or overload of voter registration system, suppressing voters", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:setup | electoral-rolls" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "ad67f547-7b8b-44c6-9710-93261447b6b2", "value": "DoS or overload of voter registration system, suppressing voters" }, { "description": "Hacking candidate laptops or email accounts", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:campaign | campaign-IT" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "bbcb7b9c-2660-4d6e-ae96-b19de3e1d107", "value": "Hacking candidate laptops or email accounts" }, { "description": "Hacking campaign websites (defacement, DoS)", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:campaign | campaign-IT" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "afe23cd3-161f-46a1-88a0-0cae3431b883", "value": "Hacking campaign websites (defacement, DoS)" }, { "description": "Misconfiguration of a website", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:campaign | campaign-IT" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "2da90b56-572f-4a24-a32b-3875bca63b3c", "value": "Misconfiguration of a website" }, { "description": "Leak of confidential information", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:campaign | campaign-IT" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "650642c7-ab31-4844-a69f-22294925edeb", "value": "Leak of confidential information" }, { "description": "Hacking/misconfiguration of government servers, communication networks, or endpoints", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:all-phases | governement-IT" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "54976d3e-7e6f-4863-9338-bc9e5041b9f2", "value": "Hacking/misconfiguration of government servers, communication networks, or endpoints" }, { "description": "Hacking government websites, spreading misinformation on the election process, registered parties/candidates, or results", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:all-phases | governement-IT" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "aba7358c-d37c-4be4-940c-5b6196140651", "value": "Hacking campaign websites, spreading misinformation on the election process, registered parties/candidates, or results" }, { "description": "DoS or overload of government websites", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:all-phases | governement-IT" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "b7eef207-ae5d-472d-bf7c-9f539c2c4bbc", "value": "DoS or overload of government websites" }, { "description": "Tampering or DoS of voting and/or vote confidentiality during or after the elections", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:voting | election-technology" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "c45378f1-e5f9-47f0-a54f-e87e3310683b", "value": "Tampering or DoS of voting and/or vote confidentiality during or after the elections" }, { "description": "Software bug altering results", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:voting | election-technology" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "dccd4b3e-4b5a-4bde-9c1f-c0101d957b97", "value": "Software bug altering results" }, { "description": "Tampering with logs/journals", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:voting | election-technology" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "86790180-cd62-4746-a93a-9f0cecaa4195", "value": "Tampering with logs/journals" }, { "description": "Breach of voters privacy during the casting of votes", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:voting | election-technology" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "ad1dd7ae-4022-4291-8cb5-27797c97ebfa", "value": "Breach of voters privacy during the casting of votes" }, { "description": "Tampering, DoS or overload of the systems used for counting or aggregating results", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:voting | election-technology" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "749a1893-a205-4623-90c1-fd7c1ba0135b", "value": "Tampering, DoS or overload of the systems used for counting or aggregating results" }, { "description": "Tampering or DoS of communication links uesd to transfer (interim) results", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:voting | election-technology" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "3c817f6f-08f3-4e8c-8d94-e23b823beb8f", "value": "Tampering or DoS of communication links uesd to transfer (interim) results" }, { "description": "Tampering with supply chain involved in the movement or transfer data", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:voting | election-technology" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "c9abc629-e87a-4bed-be52-11e96ea3803a", "value": "Tampering with supply chain involved in the movement or transfer data" }, { "description": "Hacking of internal systems used by media or press", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:campaign/public-communication | media/press" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "e84d963f-f7e0-4c3b-acb9-242ec73ef7c0", "value": "Hacking of internal systems used by media or press" }, { "description": "Tampering, DoS, or overload of media communication links", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:campaign/public-communication | media/press" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "b0577662-bcb6-45ac-b7a0-cb7ec560aff5", "value": "Tampering, DoS, or overload of media communication links" }, { "description": "Defacement, DoS or overload of websites or other systems used for publication of the results", "meta": { "date": "March 2018.", "kill_chain": [ "example-of-threats:campaign/public-communication | media/press" ], "refs": [ "https://www.ria.ee/sites/default/files/content-editors/kuberturve/cyber_security_of_election_technology.pdf" ] }, "uuid": "5079fa10-1df3-43f8-b0bf-cea7d342f5e1", "value": "Defacement, DoS or overload of websites or other systems used for publication of the results" } ], "version": 2 }