Letter archive

Z Terms — Election Security Glossary

10 election security terms starting with Z, with direct links to full definitions and source-backed context.

Z 10 terms
Zero Day Attack
Cybersecurity
An attack that exploits a previously unknown hardware, firmware, or software vulnerability.
Full definition →
Zero Fill
Infrastructure
To fill unused storage locations in an information system with a numeric value of zero.
Full definition →
Zero Report
Tabulation
Report produced prior to tabulation to check that there are no stored votes.
Full definition →
Zero Tape
Infrastructure
A tape that is printed by an electronic voting machine or electronic ballot tabulator before the machine or tabulator is to begin accepting ballots. The zero tape verifies that zero votes have been ta…
Full definition →
Zero-day Vulnerability
Cybersecurity
A computer-software vulnerability unknown to the manufacturer, typically used in targeted attacks
Full definition →
Zero-knowledge Proof
Infrastructure
A counterintuitive protocol by which a party is able to prove that a statement is true without revealing any information about the statemen t except its truth. Zero-knowledge proofs are important in a…
Full definition →
Zeroization
Election Administration
A method of erasing electronically stored data, cryptographic keys, and credentials service providers (CSPs) by altering or deleting the contents of the data storage to prevent recovery of the data.
Full definition →
Zeroize
Infrastructure
To remove or eliminate the key from a cryptographic equipment or fill device.
Full definition →
Zombie
Cybersecurity
A program that is installed on a system to cause it to attack other systems. (SP 800-83) (NISTIR)
Full definition →
Zone of Control
Legal & Policy
Three dimensional space surrounding equipment that processes classified and/or controlled unclassified information (CUI) within which TEMPEST exploitation is not considered practical or where legal au…
Full definition →