Research of Design a Security Mechanism for Military Network Voting

碩士 === 萬能科技大學 === 資訊管理研究所在職專班 === 103 === "Democracy" is the common pursuit of universal values, and citizens (voters) voting can be regarded as "direct democracy" of performance, and is become an unmistakable global trends. Undere express our Constitution, "the people there...

Full description

Bibliographic Details
Main Authors: Shan , Hsiu-Cheng, 單修政
Other Authors: Jonathan Jen-Rong Chen
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/78035798668980550418
Description
Summary:碩士 === 萬能科技大學 === 資訊管理研究所在職專班 === 103 === "Democracy" is the common pursuit of universal values, and citizens (voters) voting can be regarded as "direct democracy" of performance, and is become an unmistakable global trends. Undere express our Constitution, "the people there is an election, recall, initiative and referendum the rights". In the case of the military internal governance policies and regulations to implement is the same. The military implementation of the policies and regulations, which is the need for policy, management and implementation between the three units, mutual communication and coordination to develop common goals and vision, to reach to promote national defense policies. Taking into account any of the existing voter voting mechanism, experience and results to design a voting mechanism with the military security of the network. We using the Internet and information technology environment, which taking into account the various risk management and information security factors, then import the design of network off-road voting mechanism to military units,. The voting mechanism could provide military forces at all levels, cadres or the rank and file of a platform for exchange of views, to participate in major defense affairs timely decisions. In addition to the military personnel to enhance the effectiveness of the military directly involved in military affairs, but also produce the results provide the military policy unit to develop the military decision-making or regulatory compliance matters military units. The results of this study mechanized whole as follows: First, Voting Information Systems function regardless of how perfect the design, how to facilitate the use, preservation of user data will affect the voting results of the authenticity of the certificate authority. It shall use secure encryption and decryption mechanism and build security operations. Second, Use the Online electronic voting, hacker attacks and other threats shall be effective prevention and control or eliminate. The Institute proposed risk assessment model of the system to combat weighted index (SWP), can provide design information systems unit in the voting system build, the effective assessment of information systems security, information security and the establishment of protective measures. Third, Risk management is an important mechanism design and view information system threats and vulnerabilities, effective implementation of risk evaluation job. By a system weighted against the index of this study, we could in time to find the dangerous path to take prevention and control means to safeguard the voting information system security.