Search this site
election cybersecurity glossary
  • Home
  • About
  • Team
  • Subscribe
  • Glossary
    • Abandoned ballot
    • Absent uniformed services voter
    • Absentee
    • Absentee and early voting
    • Absentee ballot
    • Absentee ballot request
    • Absentee ballot system
    • Absentee voter
    • Absentee voting
    • Acceptance testing
    • Access
    • Access control
    • Accessibility
    • Accreditation
    • Accreditation body
    • Activation device
    • Active period
    • Adjudication
    • Adjudication-required ballot
    • Accessibility of paper records
    • Accessible ballot printer
    • Accessible voter verified paper trail
    • Accessible voting station
    • Accredited laboratory
    • Accuracy
    • Accuracy for voting systems
    • Activated state
    • Advanced Persistent Threat (APT)
    • Adversary
    • Air gap
    • Alert
    • Alert time
    • Algorithm
    • Alternative format
    • Anonymity
    • Application
    • Appropriate mark
    • Approval voting
    • Archival
    • Archival media
    • Archivalness
    • Assistive technology
    • Asymmetric cryptography
    • Attack
    • Attack method
    • Attack path
    • Attack pattern
    • Attack signature
    • Attack surface
    • Attacked
    • Attacker
    • Audio ballot
    • Audio format
    • Audit
    • Audit device
    • Audit trail
    • Audit trail for direct-recording equipment
    • Authenticate
    • Authentication
    • Authorization
    • Antivirus software
    • Audit capacity
    • Audit testing
    • Authentication
    • Authenticator
    • Authenticity
    • Authorization (to operate)
    • Availability
    • Back door
    • Backup
    • Ballot
    • Ballot accounting
    • Ballot anonymity
    • Ballot configuration
    • Ballot counter
    • Ballot counting logic
    • Ballot data
    • Ballot definition
    • Ballot display format
    • Ballot image
    • Ballot instructions
    • Ballot manifest
    • Ballot marking device
    • Ballot measure
    • Ballot on Demand (BOD)
    • Ballot preparation
    • Ballot production
    • Ballot provisioning
    • Ballot recap form
    • Ballot rotation
    • Ballot scanner
    • Ballot sheet
    • Ballot style
    • Barcode
    • Barcode reader
    • Batch
    • Batch ID
    • Batch-fed scanner
    • Benchmark
    • Blank ballot
    • Blockchain
    • Bot
    • Bot master
    • Botnet
    • Breach
    • Brute force password attack
    • Buffer overflow attack
    • Bug
    • Callable unit
    • Candidate
    • Candidate option
    • Canvass
    • Canvassing
    • Cast
    • Cast ballot
    • Cast Vote Record (CVR)
    • Central count optical scan
    • Central count tabulation
    • Central count voting system
    • Central counting center
    • Central reporting device
    • Central tabulator
    • Certification
    • Certification envelope
    • Certification testing
    • Ciphertext
    • Closed primary
    • Cloud computing
    • Code
    • Combined precinct
    • Commercial Off-The-Shelf (COTS) technology
    • Common Data Format (CDF)
    • Common Industry Format (CIF)
    • Comparison audit
    • Component
    • Compromise
    • Compromised
    • Confidentiality
    • Configuration management
    • Configuration management plan
    • Conformance
    • Conformance testing
    • Contest
    • Contest option
    • Contest option position
    • Contest option vote
    • Contest selection
    • Contested elections
    • Core logic
    • Corrective action
    • Counted ballot
    • Critical infrastructure
    • Critical infrastructure sector
    • Critical technology
    • Cross-filing
    • Cross-party endorsement
    • Cross-site scripting (XSS)
    • Cryptographic end-to-end voting system
    • Cryptographic hash
    • Cryptographic key
    • Cryptography
    • Cumulative voting
    • Cyber attack
    • Cyber
    • Decertification
    • Decryption
    • Defense-in-depth
    • Denial of service (DoS) attacks
    • Device
    • Digital certificate
    • Digital optical scan system
    • Digital signature
    • Direct Recording Electronic (DRE) voting machine
    • Disinformation
    • Distributed Denial of Service (DDOS) attack
    • Dynamic password
    • Electoral security
    • Early voting
    • Early voting center
    • Elected office
    • Election
    • Election administration
    • Election administrator
    • Election Assistance Commission (EAC)
    • Election certificates
    • Election certification
    • Election database
    • Election Day
    • Election definition
    • Election district
    • Election fraud
    • Election jurisdiction
    • Election Management System (EMS)
    • Election Night Reporting Systems (ENR)
    • Election official
    • Election programming
    • Election Reporting System (ERS)
    • Election results report
    • Election Results Reporting System
    • Election system
    • Election system providers
    • Electoral Management Body (EMB)
    • Electoral system
    • Electorate
    • Electronic ballot delivery
    • Electronic ballot interface
    • Electronic ballot return
    • Electronic cast vote record
    • Electronic device
    • Electronic Poll Book (EPB)
    • Electronic tally
    • Electronic voter interface
    • Electronic voting
    • Electronic voting machine
    • Electronic voting system
    • Eligible voters
    • Emergency paper ballots
    • Encode
    • Encoding
    • Encrypt
    • Endorsement
    • Encryption
    • Endorsement
    • Enhanced visual format
    • Error correcting code
    • Error rate
    • Escalation of privilege
    • E-Voting
    • Executive Order 13636
    • Exfiltration
    • Exhausted ballot
    • Expected mark
    • Exploit
    • Exploit code
    • Exploitation
    • Exploited
    • Exposure
    • EXtensible markup language
    • Extraneous mark
    • Failure
    • Failure rate
    • False flag
    • Fancy Bear
    • Fault
    • Fault-tolerant
    • Federal Election Commission (FEC)
    • Federal Information Processing Standards (FIPS)
    • Federal voting equipment standards
    • File
    • File type
    • Final count
    • Finding
    • Firewall
    • Firmware
    • Foreign computer intrusion
    • Foreign power
    • Full hand count
    • Functional Configuration Audit (FCA)
    • FVAP (Federal Voting Assistance Program)
    • Geographical Information System (GIS)
    • Geopolitical unit
    • Glavnoye Razvedyvatel’noye Upravlenie (GRU)
    • Hack
    • Hacker
    • Hacking
    • Hacktivism
    • Hardware
    • Hash
    • Hash function
    • Hash value
    • Hashing
    • Hashmarking
    • Help America Vote Act (HAVA)
    • High-speed central count tabulation system
    • Homeland Security
    • Honey pot
    • Hop point
    • Hostile act
    • Hybrid threats
    • Implementation statement
    • Incident
    • Incident management
    • Incident response
    • Incident response plan
    • Independently
    • Indirect selection
    • Indirectly verifiable
    • Infected
    • Information security
    • Information sharing
    • Information Sharing and Analysis Centers (ISACs)
    • Information Technology (IT)
    • Infrastructure
    • In-person voting
    • Insider threat
    • Inspection
    • Integration testing
    • Integrity
    • Key management
    • Key pair
    • Keylogger / Keystroke logger
    • Kiosk-based Internet voting
    • Legacy voting system
    • Life cycle
    • Locality
    • Logic and Accuracy (L&A) (pre-election) testing
    • Logic defect
    • Logical correctness
    • Low/no dexterity mode
    • Machine-readable mark
    • Machine-unreadable mark
    • Majority voting
    • Malicious code
    • Malicious cyber activity
    • Malware
    • Manually-marked paper ballot
    • Manufacturer
    • Marginally machine-readable mark
    • Marked ballot
    • Marksense
    • Military voter
    • Misfeed rate
    • Mitigation
    • Module
    • Multi-factor authentication
    • Multi-seat contest
    • Municipality
    • National certification test report
    • National critical infrastructure and key assets
    • National Infrastructure Coordinating Center (NICC)
    • National Infrastructure Protection Plan (NIPP)
    • National Institute of Standards and Technology (NIST)
    • National Protection and Programs Directorate (NPPD)
    • National security
    • National Security Act
    • National Voluntary Laboratory Accreditation Program (NVLAP)
    • Network
    • N-of-M voting
    • Nonpartisan office
    • Nonpartisan primary
    • Non-party-specific contest
    • Non-user-serviceable failure
    • Nonvolatile memory
    • Notice of clarification
    • Observational test
    • Offensive cyber operations
    • Office
    • Official canvass
    • Online Voter Registration (OVR)
    • On-site Internet voting
    • Open primary
    • Open source
    • Open source license
    • Open source software
    • Operating system
    • Operational environment
    • Optical scan
    • Optical scan ballots
    • Optical scan system (Op Scan)
    • Overseas voter
    • Overvote
    • Paper audit trail
    • Paper ballot
    • Paper ballot sheet
    • Paper ballot side
    • Paper balloting
    • Paper record
    • Paper-based voting system
    • Parallel testing
    • Partisan office
    • Partisan primary
    • Party-specific contest
    • Passive attack
    • Password
    • Patch
    • Pattern voting
    • Pen register
    • Pen test
    • Penetration
    • Penetration testing (Pen Testing)
    • Personal assistive device
    • Personal identifiable information (PII)
    • Phishing
    • Physical Configuration Audit (PCA)
    • Physical security
    • Plurality voting
    • Political party
    • Political subdivision
    • Poll books
    • Poll workers
    • Polling location
    • Polling place
    • Port
    • Port scanning
    • Post-election tabulation audit
    • Precinct
    • Precinct count
    • Precinct count optical scan (PCOS)
    • Precinct count tabulation
    • Precinct count voting system
    • Precinct split
    • Presentable ballot style
    • Presidential Commission on Election Administration (PCEA)
    • Presidential Policy Directive 21 (PPD-21)
    • Presidential Policy Directive 8 (PPD-8)
    • Presidential primary election
    • Primary election
    • Privacy
    • Private key
    • Probe
    • Product standard
    • Program
    • Programmed device
    • Proportional voting
    • Protected Critical Infrastructure Information (PCII)
    • Protocol
    • Provisional ballot
    • Provisional vote
    • Provisional voting
    • Proxy
    • Proxy server
    • Public key
    • Public key cryptography
    • Public key cryptography
    • Public key infrastructure
    • Public network direct-recording electronic (DRE) voting system
    • Public test
    • Qualification
    • Qualification number
    • Qualification test report
    • Qualification testing
    • Quick Response (QR) code
    • Random seed
    • Random selection of ballots
    • Range voting
    • Ranked choice voting
    • Ransomware
    • Raw vote data
    • Read ballot
    • Readiness testing
    • Recall issue with options
    • Recallable ballot
    • Receipt
    • Recertification
    • Reconnaissance
    • Record
    • Recorded ballot
    • Recount
    • Recovery
    • Red team
    • Red team exercise
    • Redundancy
    • Referendum
    • Rejected ballot
    • Remote accessible vote by mail system
    • Remote Internet voting
    • Remote voting
    • Report
    • Report total error rate
    • Reporting unit
    • Reproducibility
    • Residual vote
    • Resilience
    • Reviewed ballot
    • Risk
    • Risk analysis
    • Risk assessment
    • Risk limit
    • Risk management
    • Risk-based cybersecurity
    • Risk-limiting audit (RLA)
    • Rootkit
    • Router
    • Router operation
    • Run-off election
    • Scanned/Scanning
    • Seat
    • Second chance voting
    • Secrecy envelope
    • Secret key
    • Security analysis
    • Security controls
    • Security strength
    • Server
    • Signature
    • Significant cyber incident
    • Social engineering
    • Social media
    • Sockpuppet
    • Software
    • Software assurance
    • Software independence
    • Software license
    • Software patches
    • Source code
    • Spear phishing
    • Spam
    • Special election
    • Spoil
    • Spoiled ballot
    • Spoofing
    • Spyware
    • Squatter
    • Stakeholders
    • Standard
    • State certification
    • Straight party override
    • Straight party voting
    • Street segment data
    • Structured Query Language (SQL) injection
    • Subversion
    • Subversive activity
    • Supply chain
    • Supply chain management
    • Supply chain risk
    • Supply Chain Risk Management (SCRM)
    • Supply chain threat
    • Supply chain vulnerabilities
    • Support software
    • Supremacy of paper
    • Symmetric (secret) encryption algorithm
    • Symmetric cryptography
    • Symmetric key
    • System
    • System assurance
    • System extent
    • System verification testing
    • Systemically important critical infrastructure (SICI)
    • Tabletop exercise
    • Tabulate
    • Tabulation report
    • Tabulator
    • Tactile controls
    • Tallying
    • Targeted / Targeting
    • Targets
    • T-coil
    • Technical Data Package (TDP)
    • Technical Guidelines Development Committee (TGDC)
    • Terrorism
    • Terrorist
    • Terrorist group
    • Test
    • Test campaign
    • Test deck
    • Test method
    • Test plan
    • Test suite
    • Testing standard
    • Third-party logic
    • Threat
    • Threat agent
    • Threat analysis
    • Threat assessment
    • Threats to the national security
    • Token
    • Touch screen voting machine
    • Town
    • Township
    • Trojan horse
    • Troll
    • Troll farm
    • Two-factor authentication
    • U.S. election systems
    • U.S. Homeland
    • Unauthorized access
    • Undervote
    • Uniformed and Overseas Citizens Absentee Voting Act
    • UOCAVA voter
    • Usability
    • Usability testing
    • User-serviceable failure
    • Valid vote
    • Validation
    • Vendors
    • Verification
    • Virtual Private Network (VPN)
    • Virus
    • Visual format
    • Voluntary Voting System Guidelines (VVSG)
    • Vote
    • Vote by mail (VBM)
    • Vote center
    • Vote count
    • Vote at home
    • Vote for N-of-M
    • Vote reconciliation
    • Vote tabulation
    • Vote total tape
    • Vote variation
    • Vote-capture device
    • Voted ballot
    • Voter
    • Voter intent
    • Voter intent standard
    • Voter Registration System (VRS)
    • Voter verification/Voter verifiability
    • Voter-facing scanner
    • Voter-verifiable
    • Voter-verifiable audit record
    • Voter-Verifiable Paper Trail (VVPT)
    • Voter-Verified Paper Audit Trail (VVPAT)
    • Voting device
    • Voting equipment
    • Voting machine
    • Voting method
    • Voting process
    • Voting session
    • Voting station
    • Voting system
    • Voting system software
    • Voting System Test Laboratories (VSTLs)
    • Voting system testing
    • Vulnerability
    • Web app attack
    • Web portal
    • White box testing
    • White team
    • Whitelist
    • Whole-of-government
    • Whole-of-nation
    • Wide Area Network (WAN)
    • Wi-Fi
    • Wireless
    • Worm
    • Write-in
    • Zero report
    • Zero tape
    • Zero-day
    • Zero-day attacks
    • Zero-day vulnerability
    • Zombie
  • Sources
  • Contact Us
election cybersecurity glossary
©2020 All Rights Reserved. ELECTION CYBERSECURITY GLOSSARY® | Terms of Service | Privacy Policy | Contact Us
Report abuse
Page details
Page updated
Google Sites
Report abuse