Vous êtes sur la page 1sur 32

The Development of Polling System for Lyceum of Alabang Using Biometrics

By:
Santiago, Nerick Mhar
Tongol, John Carlos

A Project Proposal Presented to the faculty of College of Computer Studies


In partial fulfillment of the requirements for the Degree of
BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Lyceum of Alabang
College of Computer Studies
October 2016

Chapter I. Introduction
The developers create this system to help the voting systems inside the schools,
companies, Local Government offices and etc. The developers aim to give accurate and fast
result to the voters.
I.

Project Context

The developers polling system is a high-tech voting system that count and secure the
votes, store the list of the candidates, provide declaration of vote instantly when the voting
time is done, and manage to create different kinds of election and do an evaluation. The
system will be done with the useofbiometrics technology as a security confirmation of the
voter who are qualified for the election.
The biometrics technology is mainly used for identification and access control, or for
identifying individuals that are under surveillance. The basic premise of biometric
authentication is that everyone is unique and an individual can be identified by his or her
intrinsic physical or behavioral traits.
Lyceum of Alabang was founded by Dr. Danilo V. Ayap and Mr. Alfonso Borda in
2003 with its original name as the National College of Science and Technology or NCST.
The founding of the College is marked by remarkable vision and abiding faith of the
founders in the decisive role of education and technology in raising the quality of life of the
people and Lyceum of Alabang founded as the premiere institution in the south.
The reason of creating a polling system for Lyceum of Alabang is to have a good
result of decision not only during election but for the different projects that every
organization are holding like executing event surveys.
The System entitled The Development of Polling system for Lyceum of Alabang
using Biometrics Technology has two kinds of voting system: polling system itself and
election system that uses biometrics technology for more advance security. The polling
system is a survey type voting where there are certain questions about different projects or
event surveys with multiple choices.

II.

Purpose and Description

The Developers motivation in developing this system is to help the voters and users to
lessen the consumed time in voting and creating voting process. The developers want to
enhance and upgrade the traditional voting system that can give the voters or users an
accurate and fast result.

III.

Objectives

General
The main objective of the proposed system is to create a voting system that will help
the school or company to create polling of different kinds of electionand surveys to enhance
the manual system of voting and a useful, functional and a user-friendly system.
Specific

IV.

To create a system with a security.


To create a system that is user-friendly.
To create a system that can count, store and save the votes instantly.
To create a voting system that can create different kind of election.
To create a system that can do back- up the database.
To create a voting system using Biometrics.
To create a LAN based voting system.

Scope and Limitation

Scope
The polling system is a high-tech voting system with the following scopes:

Votes security
Fast counting
View and import list of candidates
Result declaration
Manage survey questions and result
Manage different kinds of election
Evaluation

Limitation
The system is limited only with the use of personal computers using LAN
technology. Online polling or use of other gadgets like phones is not allowed.

V.

Conceptual Framework

Polling System

Project Analysis
-Definition
-Requirements
Criteria
Project Design
Content
-Agile Methodology
Design
Windows8 and 10)
Project Development
Usability
-Requirements
Functionality
-Analysis
Rating:Good
-External Design
ent)
-Internal
Design
sic keyboard, Pentium 4 1.6GHz, 1GB of RAM, 3GB
of Hard
disk space, UTP, RJ45, Router
-Development
-Testing Stage
-Coding

EVALUATION AND PERFORMANCE TEST


(ISO CERTIFIED)

Chapter II. Review and Related Literature and System


Related Literature
Foreign
Application of polling system
A typical polling system consists of a number of queues, attended by a single server in a
fixed order. There is a huge body of literature on polling systems that has developed since the
late 1950s, when the papers of Macketal. concerning a patrolling repair man model for the
British cotton industry were published. The term polling originates from the so-called polling
data link control scheme, in which a central computer (server) interrogates each terminal (queue)
on a communication line to find whether it has any information (customers) to transmit. The
addressed terminal transmits information and the computer then switches to the next terminal to
check whether that terminal has any information to transmit. In a broader perspective, polling
models are applicable in situations in which several types of users compete for access to a
common resource which is available to only one type of user at a time. The ubiquity of polling
systems
can
be
observed
in
many
applications,
computercommunication,production,transportation and maintenance systems
Polling systems consists of a number of queues, attended by a single server who visits the
queues in some order to render service to the customers waiting at the queues, typically incurring
some switch-over time while moving from one queue to the next. The structural overview of the
variety of polling models considered in the literature, successively discussing model variant
switch respect to the arrival process, the buffer size, the service process, the switch-over process,
the server routing, the service discipline and the queuing discipline.
Reference: February,2011. Application of polling system. Author E.M.M Winands
Emm.winands@few.vu.nl. Retrieved from https://arxiv.org/pdf/1408.0136.pdf

The Evolution of polling in the United States

Election polling has evolved considerably since that inaugural issue. Perhapsmost
notably, there has been an explosion in the number of election polls in the United States. Traugott
(2005) estimated a 900-percent increase in trial heatpolls between 1984 and 2000. The number
has continued to grow since then,due largely to the rise in interactive-voice-response (IVR) and
Internet pollssince the 2000 election. In the 2008 election, there were an estimated 975.
There has also been a significant evolution in the nature of election polling.For decades,
polls were typically conducted by telephone, using live interviewers, on behalf of media
organizations or political candidates. Today, Internet surveys and IVR polls are increasingly
common, and polls are ofteninitiated by entrepreneurial pollsters conducting them not for a
client, butfor self-promotion (Blumenthal 2005). The dissemination of poll numbershas also
changed, with many polls now being reported directly on blogsand polling aggregation websites
rather than by the traditional media. Journalists are no longer the formal gatekeepers determining
if a given poll is of sufficient quality and interest to warrant the publics attention.
Polling aggregations employ various analytic models that attempt toaccount for house
effects. Some aggregators will exclude certain polls or weightthem according to some criteria,
for example excluding partisan polls or thosedeemed to be lower quality. Fivethirtyeight.com
weights each poll based on thepollsters historical track record, sample size, and recentness of
the poll.9 Stillothers have used algorithms that incorporate historical trends or other sources of
information (Linzer 2011). Unfortunately, since we cannot asses houseeffects until after the
election, many studies end up making the strong assumption that the average of all polls is a
reasonable gauge for house effects (Jackman 2005). Popular websites have dominated polling
aggregation in recentyears, but it seems likely that public opinion scholars will increasingly
weigh into help identify the most reasonable methods for combining polls.
Reference: Duke university on June 15,2012. The Evolution of polling in the United
States.http://poq.oxfordjournals.org// hillygusPOQpolling.pdf

Polling system Is a way of Multiplexing the service request by several users In cyclic
orderwith generally non-zero switch item. The polling scheme has been employed in computerterminal communication systems; it is implemented in standard data link protocols such as BSC.
SDLC, and HDLC. From a view point of queueing theory, it is a multiple queue, cyclic service
system whose congestion analysis has been the subject of many papers. Its analysis is now
finding a new application in the local area computer networks. This monograph presents a
reconstructions of the analysis for some types of polling system which has appeared by now in
scattered publication. Our intent is to derive the basic performance measure such as the average
message delay. Straight forward by skipping unnecessary (for our purpose) complications in the
past literature. We also compare and contrast the models we consider from a unified approach.

To unify the terminology, let us call a user requesting service a station, and the time needed to
switch service from one user to another a reply interval. The entity for service may be variable
length message or a fixed length packet. When all the statistical specifications on the message
length, message arrival process and reply interval are the same for all stations, we call the system
as the case of (statistically) identical stations; otherwise we have the case of non-identical
stations. The time may be continuous or discrete; in the letter case we choose the packet service
time as the (fixed length) slot size, and let it be the unit of time. Throughout the monograph, we
denote by the number of stations.
Reference: Www.lk.cs. ulca.edu>data>files>Takagi

Future E-voting Misconceptions.

According to `Dev Amanda, Manual systems are very subject to voter error and that could
potentially lead to fraud acts by political parties. In an event of a recount we set in the human
element that could be potentially biased. A problem that is often ignored is the poll workers who
have the ability to lose, hide, and destroy paper ballots without detection. Once the voting is
over, and all the voters leave, how easy it is to access the ballots? The issues with paper ballots
are the risks of over voting, under voting, hanging chads, etc.
Election is the act or process of choosing someone for a public office by voting (merriamwebster dictionary) and voting is an act of democracy. Citizens are given a chance to voice their
opinions by voting. Although some feel that one vote doesnt matter, others feel that their vote is
important and can determine the result of an election. How sure are we that our vote counts?
In the 2000 national election the famous butterfly ballot episode in the palm beach, Florida
sparked controversy for several reasons: 1. The ballot design 2. The inconsistent election rules 3.
Voter error and 4. Allegations of fraud. (Kunerth, Orlando Sentinel) of the total 113,820 over
votes recorded in the ballot data archive, nearly 25,000 were the result of confusing, poor
designed ballots, and most of them involved Gore, according to the most comprehensive
examination yet of the more than 175,000 uncounted ballots from the 2,000 election.
On the other hand, electronic systems are less at risk of over voting and under voting. Electronic
voting affects to large parties: The voters and the government.
(Cs.Stanford.edu) voters gain a better voting experience at the polls, are more confident that
their vote will be correctly counted, and are able to vote more easily and efficiently. The
government is potentially the political system (and voting), and ensure the most democratic
process possible.

References: Dill, D. (2004). Future E-voting Misconceptions. Retrieved from


https://courses.cs.washington.edu/courses/csep590/04au/clearedprojects/Ananda.pdf

According to Bruce Schneier In the aftermath of the U.S.s 2004 election, electronic
voting machines are again in the news. Computerized machines lost votes, subtracted votes
instead of adding them, and doubled votes. Because many of these machines have no paper audit
trails, a large number of votes will never be counted.
The U.S has been here before. After 2000, voting machine problems made
international headlines. The government appropriated money to fix the problems
nationwide. Unfortunately, electronic voting machines -- although presented as the
solution -- have largely made the problem worse. This doesnt mean that these machines
should be abandoned, but they need to be designed to increase both their accuracy, and
peoples trust in their accuracy.
Basically, a voting system has four required characteristics:
1. Accuracy. The goal of any voting system is to establish the intent of each
individual voter, and translate those intents into a final tally. This characteristic also
includes security: It should be impossible to change someone elses vote, ballot stuff,
destroy votes, or otherwise affect the accuracy of the final tally.
2. Anonymity. Secret ballots are fundamental to democracy, and voting systems
must be designed to facilitate voter anonymity.
3. Scalability. Voting systems need to be able to handle very large elections.
About 372 million people voted in Indias June elections, and over 115 million in
Brazils October elections. The complexity of an election is another issue. Unlike many
countries where the national election is a single vote for a person or a party, a United
States voter is faced with dozens of individual election: national, local, and everything in
between.
4. Speed. Voting systems should produce results quickly. This is particularly
important in the United States, where people expect to learn the results of the days
election before bedtime. Its less important in other countries, where people dont mind
waiting days -- or even weeks -- before the winner is announced.
Through the centuries, different technologies have done their best. Stones and pot
shards dropped in Greek vases gave way to paper ballots dropped in sealed boxes.
Mechanical voting booths, punch cards, and then optical scan machines replaced handcounted ballots. New computerized voting machines promise even more efficiency, and
Internet voting even more convenience.
But in the rush to improve speed and scalability, accuracy has been sacrificed. And
to reiterate: accuracy is not how well the ballots are counted by, for example, a punch-card

reader. Its not how the tabulating machine deals with hanging chads, pregnant chads, or
anything like that. Accuracy is how well the process translates voter intent into properly
counted votes.
Technologies get in the way of accuracy by adding steps. Each additional step
means more potential errors, simply because no technology is perfect. Consider an opticalscan voting system. The voter fills in ovals on a piece of paper, which is fed into an
optical-scan reader. The reader senses the filled-in ovals and tabulates the votes. This
system has several steps: voter to ballot to ovals to optical reader to vote tabulator to
centralized total.
At each step, errors can occur. If the ballot is confusing, then some voters will fill in the
wrong ovals. If a voter doesnt fill them in properly, or if the reader is malfunctioning,
then the sensor wont sense the ovals properly. Mistakes in tabulation -- either in the
machine or when machine totals get aggregated into larger totals -- also cause errors. A
manual system -- tallying the ballots by hand, and then doing it again to double-check -- is
more accurate simply because there are fewer steps.
The error rates in modern systems can be significant. Some voting technologies
have a 5% error rate: one in twenty people who vote using the system dont have their
votes counted properly. This system works anyway because most of the time errors dont
matter. If you assume that the errors are uniformly distributed.
With this background, the issue of computerized voting machines becomes clear.
Actually, "computerized voting machines" is a bad choice of words. Many of todays
voting technologies involve computers. Computers tabulate both punch-card and opticalscan machines. The current debate centers around all-computer voting systems, primarily
touch-screen systems, called Direct Record Electronic (DRE) machines.
Another issue is that software can be hacked. That is, someone can deliberately
introduce an error that modifies the result in favor of his preferred candidate. This has
nothing to do with whether the voting machines are hooked up to the Internet on election
day. The threat is that the computer code could be modified while it is being developed
and tested, either by one of the programmers or a hacker who gains access to the voting
machine companys network.

Reference: This article originally appeared on openDemocracy.com.


https://www.schneier.com/blog/archives/2004/11/the_problem_wit.html

Local
UP Diliman Implemented Its Own Automated Voting System
The system of course could not run on software alone. In order that it could run, it
would require a network of computers connected to a web server (such as Apache) and a
database server (such as MySQL). Any computer would do it need not be a dedicated
election machine so long as it could be connected to the network. In the case of UP
Diliman, an array of desktops or laptops (as may be available to the individual colleges)
are situated in the voting precincts, each logged on to an IP address on the universitybased DILNET server.
Voting in UP Diliman proceeds in the following manner. The student goes to the
precinct, and presents to the poll clerk her/his student ID (or Form 5). Once the poll clerk
is satisfied that the voter is enrolled and thus eligible to vote, the voter is given a
password taken from a list of pre-prepared computer generated passwords. The voter
heads to the computer, and is confronted by a browser screen. As required by the browser,
the student logs in her/his student number and the previously supplied password. If the
log-in is successful, the student is led to the online ballot, which features the contested
positions, the names of the candidates and their respective parties. Using a mouse, the
voter clicks on the empty boxes beside the names of their candidates of choice, thereby
marking the same. (There is also, in the UP system, a box for Abstain) Clicking the box
does not automatically record the vote, as the voter has the choice to review her/his ballot
and changing votes before finally confirming the same. Confirming the ballot and thereby
finalizing the votes requires the voter to go to the end of the ballot and undertaking two
steps: (1) typing in a Captcha code which ensures that the ballot was accomplished
through human selection; and (2) clicking on the Confirm button. Once the ballot has
been confirmed, the votes are immediately recorded on the central server. After all the
voting precincts, have closed, the tally of votes is instantaneously generated by the
central server, meaning that if the precincts close at 7:30 pm, the final tally is available at
one second past 7:30 p.m.

Reference: https://lawinnovation.wordpress.com/2010/02/18/halalandiliman/
Title: UP Diliman Implemented Its Own Automated Voting System

online e voting system

It is expected that the user should be able to vote easily online. Administration of the
page also should be user friendly. Provide step by step guide for both admin and users. User
should complete voting in a few minutes. Provide an online help. Provide also a quick guide for
users.
The system should be reliable. Security is a major concern for an e-voting system.
Process used in this system should be secure enough to be able to meet the requirements
mentioned for e-voting. It requires database connections and network connections. Changes can
be done in the databases to store the votes. All changes needs to be confirmed and if the transfer
is complete the confirmation should be displayed. The changes should be monitored.
Web server should be secure. Regular backups should be in place.
Customers voting is secure. Customers registration information is confidential. 5 Online User
Documentation and Help System Requirements. Voting system user guide will be online. Initial
version will have phone support available.
Voting system will be an online application and it can run from a machine that has an
internet access. For the web services setup, .Net Framework 2.0 and SQL 2005 required.
Preferred web servers operating system is Windows 2003. Internet connectivity is required. The
online e-voting application needs to be designed for a non-technical user. It should have specific
instructions online. Non-technical users will be involved in testing to make sure that they can
complete the process without any problems. Database access and web services access are
required.
For this project, to be able to store the requirements, use cases, design and project model
all in the same tool, Enterprise Architecture 6.5 will be used. Visual Studio 2005 and SQL Server
2005 is other development tool to use.
It will have a login screen. Login screen will have additional Completely Automated
Public Turing test to tell Computers and Humans Apart (CAPTCHA) based security check to
minimize the spam and attacks to the pages.
Admin logins will be connected to the Administrator pages where they can access
Election, Ballots, and Tally and help menus for e-voting.
Reference: Cs.uccs..edu/gsc/pub/master/havecek/doc/evoting_srs%20docu

Online national election voting

Overview
The remainder of this document identifies the system overview, design considerations,
datadesign with class and table structures, system architecture with components and userinterface
designs. Apart from these main parts, it also states the planning strategies of theproject with
Gantt diagrams and describes the tools that will be used during implementation.
System Overview
There are different types of electronic voting systems such as Punch Card Voting
System,Telephone Voting and Online Voting which are being used globally at the current period.
Dueto the impact of the internet the system will be based on online voting type.Online voting is a
form of voting in which the individuals are able to cast their votes through aweb interface.
Through the use of online voting, the voter navigates to the designatedelection site using a web
browser on an ordinary PC. The voter is then permitted to selecttheir chosen candidate and then
cast the votes which would then be sent to the electionserver for processing. There three main
types of online voting as stated above:
Kiosk Internet Voting: Voting from computers in kiosks set up by voting authority
in locationssuch as post offices and shopping malls.Poll Site Internet Voting: Voting from
designated polling sites to cast their votes by using webinterface.
Remote Internet Voting: Voting from any from any location through the use of a
computer connected to the internet. Remote voting is typically carried out at the voters
home or workplace.Due to political conditions of our country the ONEV system will be
designed as two main partsnamely Normal Interactive Mode and Election Mode and the
voting process will be executedonly at polling stations.security and safety constraints are
the main issuesof the system. The system should provide means for protecting and
securing recounts ofballots cast in election. By using SSL technologies the data
transaction between client andserver will be encrypted and all the passwords will be
stored in database in an encryptedform. A random word will be generated by the system
to prevent attacks and the system willask the user to enter it correctly for multiple trying.
For performance constraints, the system will response in a reasonable short time.
The votershould be able to login and should be able to get response in 2-3 seconds. In
Election Mode,the system will handle about 2000 transactions each second and it will be
working at 100%peak efficiency during voting process.Apart from these constraints the
system should satisfy some assumptions anddependencies such as a working internet
connection, a web server Java installed on themachine with Javas cryptographic
packages. Also, the election server will run on a http serverthat JSP is enabled.

ER Design
The poll server runs on http server that is enabled to handle server pages. It uses a
relationaldatabase to keep track of the polls, which it connects through standard database
connectivityinterfaces. In order to run the setup software, the environment needs to have
a JavaVirtual Machine running on it.
Reference:
https://senior.ceng.metu.edu.tr/2011/iteam4/documents/sdd-iteam4.pdf
Census design goals
While a wide variety of voting systems and protocols exist, the basic procedure
for conducting a democratic electiongif is fairly standard. This procedure generally
involves four tasks:
Registration
The registration task involves compiling a list of people eligible to vote.
Validation
The validation task involves checking the credentials of those attempting to vote and only
allowing those who are eligible and who have not already voted to proceed.
Collection
The collection task involves collecting the voted ballots.
Tallying
The tallying task involves counting the votes.To have confidence in the election results,
people must believe that these tasks are performed properly. However, there are numerous
opportunities for corruption during the performance of each of these tasks. For example:
Election authorities may cheat by knowingly allowing ineligible voters to register,
registered voters to cast more than one vote, or ballots to be systematically miscounted or
destroyed.
Ineligible voters may register (often under the name of someone who is deceased)
or eligible voters may register under multiple names.
Registered voters (eligible and otherwise) may be impersonated at the polls.
Ballot boxes, ballots, and vote counting machines may be compromised.
Traditionally, election fraud has been prevented through the use of physical
security measures, audit trails, and observers representative of all parties involved. But

the prevention of election fraud is made more difficult by the frequent requirement that
votes remain private. Observers may not observe a ballot until after it has been placed in
a ballot box, and audit trails must not provide the ability to link a ballot back to the voter
who cast it. Even so, these security measures generally work well enough that the
possibility of widespread fraud is small and people have confidence that election results
are accurate.
When designing an electronic polling system, it is essential to consider ways in
which the four tasks mentioned above can be performed electronically without sacrificing
voter privacy or introducing opportunities for fraud. In addition, it is useful to consider all
desirable polling system properties, including those not always achievable in traditional
systems.
Our design goals are based on our survey of the literature on traditional and
proposed electronic polling systems. We reviewed several sets of ``ideal'' election system
characteristics found in the literature [1, 10, 15, 18, 20] and developed a set of four ``core
properties'' that are likely to be desirable in almost any election system:
Accuracy
A system is accurate if (1) it is not possible for a vote to be altered, (2) it is not
possible for a validated vote to be eliminated from the final tally, and (3) it is not possible
for an invalid vote to be counted in the final tally.
In the most accurate systems the final vote tally must be perfect, either because no
inaccuracies can be introduced or because all inaccuracies introduced can be detected and
corrected. Partially accurate systems can detect but not necessarily correct inaccuracies.
Accuracy can be measured in terms of the margin of error, the probability of error, or the
number of points at which error can be introduced.
Invulnerability
A system is invulnerable if (1) it permits only eligible voters to vote, and (2) it
ensures that each eligible voter can vote only once.
Privacy
A system is private if (1) neither election authorities nor anyone else can link any
ballot to the voter who cast it, and (2) no voter can prove that he or she voted in a
particular way.
The second privacy factor is important for the prevention of vote buying and
extortion. Voters can only sell their votes if they are able to prove to the buyer that they
actually voted according to the buyer's wishes. Likewise, those who use extortiongif to
force voters to vote in a particular way cannot succeed unless they can demand that
voters prove that they voted as requested.
Verifiability

Verifiability. A system is verifiable if anyone can independently verify that all


votes have been counted correctly.
A weaker definition of verifiability used by some authors [10, 18] allows that a
system is verifiable if it allows voters to verify their own votes and correct any mistakes
they might find without sacrificing privacy. Less verifiable systems might allow mistakes
to be pointed out - but not corrected - or might allow verification of the process by party
representatives but not by individual voters. Traditional voting systems generally only
allow for minimal verification by party representatives.
In addition, we developed three extra properties that an electronic polling system
should possess. Two of these properties are important for ensuring a high voter turnout,
something that is often desired but not always achieved.
Convenience
A system is convenient if it allows voters to cast their votes quickly, in one
session, and with minimal equipment or special skills.
Flexibility
A system is flexible if it allows a variety of ballot question formats including open
ended questions (this is important for write-in candidates and some survey questions).
Mobility
A system is mobile if there are no restrictions (other than logistical ones) on the
location from which a voter can cast a vote.
One of the reasons people are interested in electronic voting systems is that they
can be mobile. Voter participation might increase if people could easily cast votes from
computers in their homes, offices, schools, and libraries. Of course, for governmental
elections it would be essential to retain centralized polling places for people who would
not otherwise have access to computers.
The mobility property itself is a major contributor to some of the problems
associated with designing a secure and private electronic voting system. By allowing
voters to cast their votes from virtually anywhere, we dramatically expand the universe of
ineligible people who may attempt to vote. We also limit our abilities to prevent voters
from proving how they voted, as there are no longer private voting booths that can
prevent vote buyers from observing vote sellers as they cast their votes.
We designed Census to possess all of the above properties (to varying degrees),
with one exception. Census does not address the second part of the privacy property.
Unless voters are required to cast their votes from inside a solitary voting booth, voters
will be able to prove how they voted by allowing another party to observe them while
they are casting their votes. We do not believe this problem can be addressed without
sacrificing mobility or convenience.

In addition, like most distributed cryptographic systems, Census does not address
problems related to ballots being intercepted or delayed while in transit. The design of the
Sensus system assumes that voters have a reliable mechanism for delivering messages to
the election authorities in a timely manner.
Reference: https://lorrie.cranor.org/pubs/hicss/hicss.html

Security
System Security
A top priority for any voting system is to maintain the integrity of the votes cast
during an election. Online voting systems are only feasible means of carrying out an
election, if the system is safe and secure. Voters, who are not confident with the security
aspects of the voting system, will not want to cast their votes online. Secure systems are
developed so that the rewards retrieved when system is protected outweigh the costs of
the system being broken into by a computer hacker. The systems security should be in
proportionto what it is protecting. In an online voting system client/server security is an
important feature which should be carefully implemented. In order to achieve this goal,
an efficient form of authorization and authentication has to be established.
6.1 Network Security Attacks
Any web based computer system is susceptible to attacks from system hackers
who could attempt to overwhelm a computer system to gain information for illegal use.
They could also attempt to crash a system for the aim of sabotaging a Companys
business operations. There are a number of system attacks that have been established to
sabotage computer systems.
6.1.1 Denial of Service Attack (DOS)
A denial of service attack is an attack on a computer or network system that
causes the systems users to be deprived of the services which the system provides. The
typical loss of service could be the temporary loss of network connectivity which could
affect a web based business considerably due to the fact that the website might have to
cease operation to its customers. The DOS attack can come in a number of forms.
Michael Chinwuba 0305806830
6.1.2 Man-In-The-Middle Attack (MITM)
MITM attack is an attack in which data being transmitted between two parties on
a network is intercepted, read and modified by a system attacker without the
communicating parties knowing that their data has been compromised. To describe the
MITM attack process, this form of attack can be explained as Stephanie being the client
would like to establish a connection directly with Michael the server. Stan the attacker
would lie in wait for Stephanie to send a request to Michael, upon Stephanie sending the
request; Stan would intercept the request, manipulate it and send it to Michael for

processing. Michael thinking, he is responding to Stephanie directly send as response


which Stan intercepts as shown in figure 6-1. [40] Figure 6-1: MITM Attack Method
6.2 Authentication
Authentication is the process of establishing whether someone or something is
who or what it is declared to be. In most internet network systems authentication is
generally done through the use of login usernames and passwords. The user of the system
is assumed to know the password in order to get authenticated. Every user is initially
registered on the system by a system administrator using an
Michael Chinwuba 0305806831
Assigned or self-declared password. On each subsequent use, the user must know
and use the previously declared password. The main weakness of these kinds of systems
that is considerable is that passwords can be guessed, stolen, accidentally revealed, or
forgotten by the user. System hackers use password guessing as a simple method of
attacking acomputer system, be it on a network or offline. Password guessing requires the
hacker to have known usernames and suitable password guesses, by persistently trying
the guessed passwords into the system, the attacker could finally break in, and this is
mainly due to poor passwords being chosen by users. The best way to protect a system
from this form of unwanted intrusion is to prevent users fromhaving an infinite number of
login attempts with wrong passwords; the user should be locked out of the system after a
specific number of failed login attempts. [30] Another form of password theft can be
achieved by a hacker illicitly tapping into system terminal on a network and logging the
passwords entered. A way of counteringthis form of attack is by encrypting the data
traffic on the network. [30] For this reason, Internet business and many other transactions
require a more stringentauthentication process. The use of digital certificates issued and
verified by a CertificateAuthority (CA) as part of a public key infrastructure is considered
likely to become thestandard way to perform authentication on the Internet
Reference: https://www.scribd.com/doc/21386702/secure-online-voting-system
Related System
Foreign
Foreign Related system
Aug. 30, Afghanistans Electoral Reforms Commission finally submitted two proposals
containing multiple recommendations to the National Unity Government for reforming the
electoral process, following months of delay and political bickering. One proposal was

developed by two members who boycotted the commission out of frustration, while the other
came from the remaining members.
While each of the 11 total recommendations merits deliberation, there are two in particular that
deserve in-depth evaluation: the mixed-proportional representation electoral system and the plan
to establish single voters districts.
The first recommendation which calls for a mixed-proportional representation system
allots one third of Parliaments 250 seats to political parties, and the remaining two-thirds to
minority groups (Kuchis get 10 seats, women get 68 seats, and Hindus get one seat) and
independent candidates.
For the political parties third of the seats, the country is treated as an at-large, single
constituency: all Afghans vote for the 250 vacant seats. For the remaining two-thirds, each
Afghan gets one vote for candidates running in their applicable voting district.
This proposal can be explained as a notional constituency with nine members of parliament.
According to the proposal, three seats will go to political parties candidates, and the remaining
six seats are selected by six constituencies whose boundaries are drawn by population.
Problematically for the political parties, the partys size determines the number of seats it gets,
and each party has to choose one of two approaches for their ballots: a closed list or an open list.
If the political parties use a closed list nominating their candidates in advance the voters
(the majority of whom are uneducated and illiterate) will be in a difficult situation. Since the
parliamentary and provincial councils elections are supposed to be conducted simultaneously,
voters will have three different ballots: one for their relevant district council; one for the
parliament candidates for their relevant district; and one for political parties reserved seats.
Since the quota seats constituency is at-large, every voter across the country has to have the
same ballot for the quota seats.
The number of political parties is unclear. But assuming there are 50 parties (an underestimation
of the actual number), and each one nominates 83 candidates (the one-third of seats allotted to
parties), each voter will have a quota ballot paper consisting of 4,150 candidates. This doesnt
even include the two other ballots full of candidates that voters will have. This situation would
not only retard the voting process, but also create technical problems for voters and slow down
the counting process, increasing the chances of fraud.
While a closed-list option comes with its own technical difficulties, neither the proposed closedlist nor open-list options are preferable from a legal standpoint. Article 83of the Afghan
constitution requires members of the National Assembly to be elected through a direct, general,
and secret vote of the people. Introducing a mixed-proportional representation system with a

closed-list or open-list option will lead to some members being elected indirectly, a violation
of Article 83.
Moreover, the stipulation in the mixed-proportional representation voting proposal that only
political parties that win three percent of votes nationally are eligible for quota seats in the
national assembly is also problematic. Only parties that have a national constituency will pass
muster.

http://foreignpolicy.com/2015/11/11/afghanistans-broken-electoral-system/
Japan adopted E-voting for local election in 2002, such as mayor and councilor election
of Niimi city in Okayama prefecture in June 23, 2002; mayor election of Hiroshima city in
February 02, 2003; and mayor election of Kyoto city in February 08, 2004. Take mayor and
councilor election of Niimi city for example, electoral center surveyed the voters reliability
when the election finished. There are 83% of voters considered that E-voting system is trusted.
56% of them considered that the results of E-voting and paper-based voting are the same
therefore E-voting is sufficient for reliable. The reasons why voters cant trust the E-voting
system are voters worried about the abuses in E-voting system, and they cannot make sure their
ballot are recorded correctly.
http://www.slideshare.net/folagtech/electronic-voting-system

Brazil: Brazil used E-voting in 1998. When the voter reaches the polling place, he shows
his identity card for authenticating; if he is an eligible voter, he can get the ballot for E-voting.
Brazils E- voting system transmits votes to electoral center immediately, so that the count of
votes can announce rapidly while the voting finished

https://prezi.com/u1tzftr46mma/university-voting-system
The main purpose of this study is to boost the turnout of votes. For this
purpose, we have to view all the aspects responsible for low turnout. Some people
hesitate to vote due to weather conditions in different areas during the election,
youngsters of age group 18 24 having no charm to cast the vote. People who are
outside of their town/city dont want to come to their area for just casting the votes
due to the expenses and trouble of transportation. Same situation is also for those

who are on duty during the election, they dont have any interest to cast their vote
during job or they dont have facility to submit their vote. A second purpose is to
make it more difficult to commit fraud and cheating during an election. In a manual
system, sometimes people are registered in more than one area and can thus cast
the vote multiple times. By creating an online database covering the country it will
be possible to eliminate the double casting of votes. In some areas, officials of the
Election Commission themselves cast votes and after the end of election they adjust
these votes from the voters list. Hence, they manipulate the result of the election.
There is clearly a need of a system that could reduce the authority of officials and
could sustain the true nature of voting. It would also give people options to cast an
empty vote if they dont like to give the vote to any of the candidates.
In Pakistans current Paper Polling System, there are some other troubles as
well apart from low turnout of votes, by looking at those problems, it is necessary to
build a system which could solve those problems and speed up the election
system. 1. Speed: Hand counting votes is time consuming especially in most
populated countries like Pakistan, where many candidates are for same position and
voter has to cast vote for many races. 2. Intelligibility: When a system based on
pens, stamps, punch cards or ballot papers is used for voting in a Paperbased
Polling System, the result can be ambiguous. 3. Accessibility: Disabled or duty
bound people do not have an easy access to the poll booth, but an easily touchable
system will help them to cast their vote. 4. Transparency: Chances of manipulation
of the results from influencing authorities will almost be finished.
http://www.diva-portal.org/smash/get/diva2:443096/fulltext01

This project was founded and created to replace the existing manual voting system of
Redeeming Grace Learning Center (RGLC) that had produced inconvenience not only to the
voters but also to the election facilitators.
Computerized Voting System is widely used in elections. This paper describes using a
computerized voting system as a basis for a project in an Information Technology course.
Through the formulation of this system the students are indeed confident that the whole electoral
process will not only be fast and quick but most of all accurate and precise.
https://www.scribd.com/doc/146455124/Voting-System-Thesis

Local

The fingerprint shows the most promising future in real-worldapplications. Because of their uniqueness and
consistency over time, fingerprintshave been used for identification and authentication purpose. However, there
aresome challenges in using fingerprint in real-world application. We are interestedin designing and analyzing the
Mobile voting system using fingerprint texture,which is the core in current modern approach for fingerprint
analysis. As themobile phone become a part of the human, it is very convenient to use. We areusing the mobile
phone for the purpose of voting. It helps the user to poll theirvote in spite of any location and also in short period of
time. Keywords

Biometric, Fingerprint, Minutiae, Mobile phone. Elections allow the populace tochoose their representatives and
express their preferences for how they will begoverned. Naturally, the integrity of the election process is
fundamental to theintegrity of democracy itself. The election system must be sufficiently robust towithstand a
variety of fraudulent behaviors and must be sufficiently transparentand comprehensible that voters and candidates
can accept the results of anelection. Most of the countries in the world e-Voting system have been used. Dueto
rapid growth of technology security problems are getting increased. So insteadof developing e-voting systems,
also there is a lot research work is being done tomake these systems more secure.
Authors:U. Rajkumar, H. Karunakaran, B.karthikeyan&M.venkatesh,(March 2012)
A Secure Mobile Voting System Using Fingerprintretrieved
from
http://www.studymode.com/essays/A-Secure-Mobile-Voting-System-Using-937050.html

The Student Council elections have always been a perennial activity for every school. It is an
activity wherein each student is required to choose from a set of candidates who will represent
each position in the Student Council. In order for the student to accomplish this, the student must
go through several processes. First the student must go to the Administration Office if he is a
registered voter, then goes to the voting area and chooses the candidates he likes. After that, the
student submits the filled-up ballot form to the voting administrator in order for his votes to be
cast. Then the student is marked with an indelible ink to signify that he has already voted.
The introduction of computers greatly enhances the speed and efficiency of voting process.
Results could be attained even right after the elections reducing the time to a mere fraction
compared to the time it takes if the voting is done manually. It also increases the level of the
voting experience because of multimedia enhancements. The manual voting system of San Juan
National High school lacks the advantages of a Graphical User Interface that the Windows OS
could offer
By: Shiexy, (August 2010) Voting System. StudyMode.com.
http://www.studymode.com/essays/Voting-System-381603.html

Retrieved

from

A Thesis proposal presented to the faculty of the "department of Social


Sciences and humanities, college of Arts and Sciences, Cavite State University, Indang, Cavite in partial
fulfillment of the requirements for the "degree of bachelor of Arts in Political Science
The concept of elections and suffrage are one of the fundamental principles in
everydemocratic nation in the world. From the time of the ancient Greeks, people have fought
tyrannyf o r t h e r i g h t t o c h o o s e t h e i r o w n l e a d e r s . T h e c o n c e p t o f a
f r e e a n d f a i r e l e c t i o n t h u s m a d e democracy one of the most powerful political
philosophies in the world today.In the international sphere, there is no specific and
standard definition of what free and fair democratic election meant. The International
Law by necessary implications is only trying tolay down a guide and qualities of what a free and
fair democratic election should be and what itshould not be, the other aspect International Law
tries to emphasize is the relevance and legalityin the right to democracy under customary
International Law.

according to article # 21 of the universal declaration of human (rights, ) everyone has


ther i g h t t o t a k e p a r t i n t h e g o v e r n m e n t o f h i s c o u n t r y , d i r e c
t l y o r t h r o u g h f r e e l y c h o s e n representatives. ) everyone has the right of equal
access to public service in his country. "and thewill of the people shall be the basis of the
authority of government* this will shall be expressed in periodic and genuine elections
which shall be by universal and equal suffrage and shall be held by secret vote or by equivalent
free voting procedures.
The International Covenant on Civil and political rights (ICCPR) also
states that everyc i t i z e n s h a l l h a v e t h e r i g h t a n d t h e o p p o r t u n i t y t o
t a k e p a r t i n t h e c o n d u c t o f p u b l i c a f f a i r s , directly or through freely
choose representative, to vote and to be elected at genuine periodic e l e c t i o n s
which shall be by universal and equal suffrage and shall be held by
s e c r e t b a l l o t , guaranteeing the free expression of the will of the electors and
to have access, on general terms of equality, to public service in his country.
Since the beginning of elections in the Philippines, the electoral process has been generall
ycharacteried by irregularities such as fraud, terrorism, violence, vote0buying, ballot
snatching, bribery, cheating, and the like. These do not reflect the true will of the Filipino people,
thus, agross violation of the right to suffrage. This affects the credibility of the
whole democratic process and mocks at the sacred right to suffrage.
Another problem with regards to the electoral system in the Philippines is its traditional
way of writing the name of their chosen candidate in an ordinary piece of paper.
It has always been a burden for canvassers to do the counting of votes and the long process
has been the causeof countless election fraud. 1ne of the burdens of the manual system is its slow
results becauset h e c o u n t i n g o f v o t e s i s p e r f o r m e d m a n u a l l y . I t i s a l s o
the reason why many candidates are

Appealing to the Commission on )lections and to the court that they have been
cheated duringthe counting. 2anual voting s ystem gave rise to fraudulent
election practices like tampering ofelection returns and statements of votes. after each
election, the Comelec and courts are floodedwith complaints of election fraud.

https://www.scribd.com/doc/39491269/Automated-Election-Assessment-Thesis-Proposal

Synthesis

Chapter III. Technical Background


User Interface

Login form where the student, person in charge and admin will login to have access in the
system.

Form where the user chooses if polling or election

Student or voter will choose where polling he/she will vote.

Choices of the chosen poll.

The form where admin will add student.

In charge person form where he/she can create, edit and active/de-active a poll and election.

The design of adding poll form.

Selection poll that you will edit.

The Active and inactive of poll form

Form where you can add election

Database Specification
Software Specification

Visual Studio 2010 - is an integrated development environment (IDE) from Microsoft. It


is used to develop computer programs for Microsoft Windows, as well as web sites, web
applications and web services.

SQL Server 2008 R2 - Is a server operating system developed by Microsoft, which


builds on the enhancements built into Windows Server 2008. The operating system,
which is highly integrated with the client edition of Windows 7, offers improvements in
scalability and availability, as well as power consumption.

Windows 7 and up Compatibility of the program and its a personal


computer operating system developed by Microsoft. It is a part of the Windows
NT family of operating systems.

Hardware Specification
Computer

CPU - Computer that has a 1.6GHz or faster processor


RAM - 1 GB (32 Bit) or 2 GB (64 Bit) RAM (Add 512 MB if running in a virtual
machine)
Hard disk - 3GB of available hard disk space
Hard disk drive - 5400 RPM
video card - capable of running at 1024 x 768 or higher-resolution display

Biometrics

Image area - 9.75mm X 0.41mm / 192 X 8 pixels


Image resolution 500 pixels per inch
Operating system Windows 7

Communication Interfaces
Hybrid network topology is a combination of two or more different basic network
topologies.
Star Bus Topology - A networking topology in which hubs for workgroups or
departmental local area networks (LANs) are connected by using a network bus to form a single
network. Star bus topology is a combination of star topology superimposed on a backbone bus
topology.

UTP - Unshielded twisted pair (UTP) is the most popular and is generally the best option
for school networks. The quality of UTP may vary from telephone-grade wire to
extremely high-speed cable
RJ45 - is a plastic connector that looks like a large telephone-style connector. Standard
RJ-45 pin-outs define the arrangement of the individual wires needed when attaching
connectors to a cable, commonly seen with Ethernet cables and networks.
Router - A router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. A data packet is
typically forwarded from one router to another through the networks that constitute the
internetwork until it reaches its destination node.

STAR

Regular 10Base2 or 10BaseT


cables with uplink ports on
hubs
Crossover cables for regular
ports on the hub

the
(host)
Special cables for stackable
BUS

hubs
TOPOLOGY

Vous aimerez peut-être aussi