The careful modeling of the system described in the first four parts of this series requires a great deal of effort by multiple contributors, but one of the benefits is that it enables us to investigate the security vulnerabilities of the system in a complete and systematic fashion. FMEA stands for Failure Mode Effect and
The careful modeling of the system described in the first four parts of this series requires a great deal of effort by multiple contributors, but one of the benefits is that it enables us to investigate the security vulnerabilities of the system in a complete and systematic fashion. FMEA stands for Failure Mode Effect and
We can do the same thing internally for the system components, for example, in the software operations of the DRE. We can begin to decompose the functions of the voting machine using a SysML activity diagram, as shown in Figure 1. This diagram describes the first part of the test and validation activity before voting
We can do the same thing internally for the system components, for example, in the software operations of the DRE. We can begin to decompose the functions of the voting machine using a SysML activity diagram, as shown in Figure 1. This diagram describes the first part of the test and validation activity before voting
In the first part of the series, we considered the Concept-of-Operations, identifying the system domain and its primary objectives. We also considered the objectives of a Bad Actor who desires to abuse the system. Finally, we brought requirements into the model. Now we will go ahead and start designing the system, following those requirements. We
In the first part of the series, we considered the Concept-of-Operations, identifying the system domain and its primary objectives. We also considered the objectives of a Bad Actor who desires to abuse the system. Finally, we brought requirements into the model. Now we will go ahead and start designing the system, following those requirements. We