Blog

September 11, 2018
No Comments

The careful modeling of the system described in the first four parts of this series requires a great deal of effort by multiple contributors, but one of the benefits is that it enables us to investigate the security vulnerabilities of the system in a complete and systematic fashion. FMEA stands for Failure Mode Effect and

September 6, 2018
No Comments

The careful modeling of the system described in the first four parts of this series requires a great deal of effort by multiple contributors, but one of the benefits is that it enables us to investigate the security vulnerabilities of the system in a complete and systematic fashion. FMEA stands for Failure Mode Effect and

August 28, 2018
2 Comments

In the first part of the series, we considered the Concept-of-Operations, identifying the system domain and its primary objectives. We also considered the objectives of a Bad Actor who desires to abuse the system. Finally, we brought requirements into the model. Now we will go ahead and start designing the system, following those requirements. We

August 23, 2018
3 Comments

In the first part of the series, we considered the Concept-of-Operations, identifying the system domain and its primary objectives. We also considered the objectives of a Bad Actor who desires to abuse the system. Finally, we brought requirements into the model. Now we will go ahead and start designing the system, following those requirements. We

August 21, 2018
1 Comment

Having established the system domain and high-level objectives of our Electronic Voting System (EVS) in Part 1, the typical next step in systems engineering is requirements process in which we generate the requirements that the system must meet. A common pattern here is that requirements are managed in a specialized requirements management tool like DOORS

August 16, 2018
3 Comments

Having established the system domain and high-level objectives of our Electronic Voting System (EVS) in Part 1, the typical next step in systems engineering is requirements process in which we generate the requirements that the system must meet. A common pattern here is that requirements are managed in a specialized requirements management tool like Jama

August 14, 2018
4 Comments

Recently I took the opportunity of the INCOSE International Symposium being in Washington DC to consider how modern approaches to Systems Engineering might impact an issue with political and social implications, specifically electronic voting system (EVS) security. It’s impossible to open the newspaper or turn on the TV without hearing something about election security issues.

August 9, 2018
7 Comments

Recently I took the opportunity of the INCOSE International Symposium being in Washington DC to consider how modern approaches to Systems Engineering might impact an issue with political and social implications, specifically electronic voting system (EVS) security. It’s impossible to open the newspaper or turn on the TV without hearing something about election security issues.