Search this site
Skip to main content
Skip to navigation
election cybersecurity glossary
Home
About
Team
Subscribe
Glossary
Abandoned ballot
Absent uniformed services voter
Absentee
Absentee and early voting
Absentee ballot
Absentee ballot request
Absentee ballot system
Absentee voter
Absentee voting
Acceptance testing
Access
Access control
Accessibility
Accreditation
Accreditation body
Activation device
Active period
Adjudication
Adjudication-required ballot
Accessibility of paper records
Accessible ballot printer
Accessible voter verified paper trail
Accessible voting station
Accredited laboratory
Accuracy
Accuracy for voting systems
Activated state
Advanced Persistent Threat (APT)
Adversary
Air gap
Alert
Alert time
Algorithm
Alternative format
Anonymity
Application
Appropriate mark
Approval voting
Archival
Archival media
Archivalness
Assistive technology
Asymmetric cryptography
Attack
Attack method
Attack path
Attack pattern
Attack signature
Attack surface
Attacked
Attacker
Audio ballot
Audio format
Audit
Audit device
Audit trail
Audit trail for direct-recording equipment
Authenticate
Authentication
Authorization
Antivirus software
Audit capacity
Audit testing
Authentication
Authenticator
Authenticity
Authorization (to operate)
Availability
Back door
Backup
Ballot
Ballot accounting
Ballot anonymity
Ballot configuration
Ballot counter
Ballot counting logic
Ballot data
Ballot definition
Ballot display format
Ballot image
Ballot instructions
Ballot manifest
Ballot marking device
Ballot measure
Ballot on Demand (BOD)
Ballot preparation
Ballot production
Ballot provisioning
Ballot recap form
Ballot rotation
Ballot scanner
Ballot sheet
Ballot style
Barcode
Barcode reader
Batch
Batch ID
Batch-fed scanner
Benchmark
Blank ballot
Blockchain
Bot
Bot master
Botnet
Breach
Brute force password attack
Buffer overflow attack
Bug
Callable unit
Candidate
Candidate option
Canvass
Canvassing
Cast
Cast ballot
Cast Vote Record (CVR)
Central count optical scan
Central count tabulation
Central count voting system
Central counting center
Central reporting device
Central tabulator
Certification
Certification envelope
Certification testing
Ciphertext
Closed primary
Cloud computing
Code
Combined precinct
Commercial Off-The-Shelf (COTS) technology
Common Data Format (CDF)
Common Industry Format (CIF)
Comparison audit
Component
Compromise
Compromised
Confidentiality
Configuration management
Configuration management plan
Conformance
Conformance testing
Contest
Contest option
Contest option position
Contest option vote
Contest selection
Contested elections
Core logic
Corrective action
Counted ballot
Critical infrastructure
Critical infrastructure sector
Critical technology
Cross-filing
Cross-party endorsement
Cross-site scripting (XSS)
Cryptographic end-to-end voting system
Cryptographic hash
Cryptographic key
Cryptography
Cumulative voting
Cyber attack
Cyber
Decertification
Decryption
Defense-in-depth
Denial of service (DoS) attacks
Device
Digital certificate
Digital optical scan system
Digital signature
Direct Recording Electronic (DRE) voting machine
Disinformation
Distributed Denial of Service (DDOS) attack
Dynamic password
Electoral security
Early voting
Early voting center
Elected office
Election
Election administration
Election administrator
Election Assistance Commission (EAC)
Election certificates
Election certification
Election database
Election Day
Election definition
Election district
Election fraud
Election jurisdiction
Election Management System (EMS)
Election Night Reporting Systems (ENR)
Election official
Election programming
Election Reporting System (ERS)
Election results report
Election Results Reporting System
Election system
Election system providers
Electoral Management Body (EMB)
Electoral system
Electorate
Electronic ballot delivery
Electronic ballot interface
Electronic ballot return
Electronic cast vote record
Electronic device
Electronic Poll Book (EPB)
Electronic tally
Electronic voter interface
Electronic voting
Electronic voting machine
Electronic voting system
Eligible voters
Emergency paper ballots
Encode
Encoding
Encrypt
Endorsement
Encryption
Endorsement
Enhanced visual format
Error correcting code
Error rate
Escalation of privilege
E-Voting
Executive Order 13636
Exfiltration
Exhausted ballot
Expected mark
Exploit
Exploit code
Exploitation
Exploited
Exposure
EXtensible markup language
Extraneous mark
Failure
Failure rate
False flag
Fancy Bear
Fault
Fault-tolerant
Federal Election Commission (FEC)
Federal Information Processing Standards (FIPS)
Federal voting equipment standards
File
File type
Final count
Finding
Firewall
Firmware
Foreign computer intrusion
Foreign power
Full hand count
Functional Configuration Audit (FCA)
FVAP (Federal Voting Assistance Program)
Geographical Information System (GIS)
Geopolitical unit
Glavnoye Razvedyvatel’noye Upravlenie (GRU)
Hack
Hacker
Hacking
Hacktivism
Hardware
Hash
Hash function
Hash value
Hashing
Hashmarking
Help America Vote Act (HAVA)
High-speed central count tabulation system
Homeland Security
Honey pot
Hop point
Hostile act
Hybrid threats
Implementation statement
Incident
Incident management
Incident response
Incident response plan
Independently
Indirect selection
Indirectly verifiable
Infected
Information security
Information sharing
Information Sharing and Analysis Centers (ISACs)
Information Technology (IT)
Infrastructure
In-person voting
Insider threat
Inspection
Integration testing
Integrity
Key management
Key pair
Keylogger / Keystroke logger
Kiosk-based Internet voting
Legacy voting system
Life cycle
Locality
Logic and Accuracy (L&A) (pre-election) testing
Logic defect
Logical correctness
Low/no dexterity mode
Machine-readable mark
Machine-unreadable mark
Majority voting
Malicious code
Malicious cyber activity
Malware
Manually-marked paper ballot
Manufacturer
Marginally machine-readable mark
Marked ballot
Marksense
Military voter
Misfeed rate
Mitigation
Module
Multi-factor authentication
Multi-seat contest
Municipality
National certification test report
National critical infrastructure and key assets
National Infrastructure Coordinating Center (NICC)
National Infrastructure Protection Plan (NIPP)
National Institute of Standards and Technology (NIST)
National Protection and Programs Directorate (NPPD)
National security
National Security Act
National Voluntary Laboratory Accreditation Program (NVLAP)
Network
N-of-M voting
Nonpartisan office
Nonpartisan primary
Non-party-specific contest
Non-user-serviceable failure
Nonvolatile memory
Notice of clarification
Observational test
Offensive cyber operations
Office
Official canvass
Online Voter Registration (OVR)
On-site Internet voting
Open primary
Open source
Open source license
Open source software
Operating system
Operational environment
Optical scan
Optical scan ballots
Optical scan system (Op Scan)
Overseas voter
Overvote
Paper audit trail
Paper ballot
Paper ballot sheet
Paper ballot side
Paper balloting
Paper record
Paper-based voting system
Parallel testing
Partisan office
Partisan primary
Party-specific contest
Passive attack
Password
Patch
Pattern voting
Pen register
Pen test
Penetration
Penetration testing (Pen Testing)
Personal assistive device
Personal identifiable information (PII)
Phishing
Physical Configuration Audit (PCA)
Physical security
Plurality voting
Political party
Political subdivision
Poll books
Poll workers
Polling location
Polling place
Port
Port scanning
Post-election tabulation audit
Precinct
Precinct count
Precinct count optical scan (PCOS)
Precinct count tabulation
Precinct count voting system
Precinct split
Presentable ballot style
Presidential Commission on Election Administration (PCEA)
Presidential Policy Directive 21 (PPD-21)
Presidential Policy Directive 8 (PPD-8)
Presidential primary election
Primary election
Privacy
Private key
Probe
Product standard
Program
Programmed device
Proportional voting
Protected Critical Infrastructure Information (PCII)
Protocol
Provisional ballot
Provisional vote
Provisional voting
Proxy
Proxy server
Public key
Public key cryptography
Public key cryptography
Public key infrastructure
Public network direct-recording electronic (DRE) voting system
Public test
Qualification
Qualification number
Qualification test report
Qualification testing
Quick Response (QR) code
Random seed
Random selection of ballots
Range voting
Ranked choice voting
Ransomware
Raw vote data
Read ballot
Readiness testing
Recall issue with options
Recallable ballot
Receipt
Recertification
Reconnaissance
Record
Recorded ballot
Recount
Recovery
Red team
Red team exercise
Redundancy
Referendum
Rejected ballot
Remote accessible vote by mail system
Remote Internet voting
Remote voting
Report
Report total error rate
Reporting unit
Reproducibility
Residual vote
Resilience
Reviewed ballot
Risk
Risk analysis
Risk assessment
Risk limit
Risk management
Risk-based cybersecurity
Risk-limiting audit (RLA)
Rootkit
Router
Router operation
Run-off election
Scanned/Scanning
Seat
Second chance voting
Secrecy envelope
Secret key
Security analysis
Security controls
Security strength
Server
Signature
Significant cyber incident
Social engineering
Social media
Sockpuppet
Software
Software assurance
Software independence
Software license
Software patches
Source code
Spear phishing
Spam
Special election
Spoil
Spoiled ballot
Spoofing
Spyware
Squatter
Stakeholders
Standard
State certification
Straight party override
Straight party voting
Street segment data
Structured Query Language (SQL) injection
Subversion
Subversive activity
Supply chain
Supply chain management
Supply chain risk
Supply Chain Risk Management (SCRM)
Supply chain threat
Supply chain vulnerabilities
Support software
Supremacy of paper
Symmetric (secret) encryption algorithm
Symmetric cryptography
Symmetric key
System
System assurance
System extent
System verification testing
Systemically important critical infrastructure (SICI)
Tabletop exercise
Tabulate
Tabulation report
Tabulator
Tactile controls
Tallying
Targeted / Targeting
Targets
T-coil
Technical Data Package (TDP)
Technical Guidelines Development Committee (TGDC)
Terrorism
Terrorist
Terrorist group
Test
Test campaign
Test deck
Test method
Test plan
Test suite
Testing standard
Third-party logic
Threat
Threat agent
Threat analysis
Threat assessment
Threats to the national security
Token
Touch screen voting machine
Town
Township
Trojan horse
Troll
Troll farm
Two-factor authentication
U.S. election systems
U.S. Homeland
Unauthorized access
Undervote
Uniformed and Overseas Citizens Absentee Voting Act
UOCAVA voter
Usability
Usability testing
User-serviceable failure
Valid vote
Validation
Vendors
Verification
Virtual Private Network (VPN)
Virus
Visual format
Voluntary Voting System Guidelines (VVSG)
Vote
Vote by mail (VBM)
Vote center
Vote count
Vote at home
Vote for N-of-M
Vote reconciliation
Vote tabulation
Vote total tape
Vote variation
Vote-capture device
Voted ballot
Voter
Voter intent
Voter intent standard
Voter Registration System (VRS)
Voter verification/Voter verifiability
Voter-facing scanner
Voter-verifiable
Voter-verifiable audit record
Voter-Verifiable Paper Trail (VVPT)
Voter-Verified Paper Audit Trail (VVPAT)
Voting device
Voting equipment
Voting machine
Voting method
Voting process
Voting session
Voting station
Voting system
Voting system software
Voting System Test Laboratories (VSTLs)
Voting system testing
Vulnerability
Web app attack
Web portal
White box testing
White team
Whitelist
Whole-of-government
Whole-of-nation
Wide Area Network (WAN)
Wi-Fi
Wireless
Worm
Write-in
Zero report
Zero tape
Zero-day
Zero-day attacks
Zero-day vulnerability
Zombie
Sources
Contact Us
election cybersecurity glossary
Distributed Denial of Service (DDOS) attack
Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse