The careful modeling of the system described in the first four parts of this series requires a great deal of effort by multiple contributors, but one of the benefits is that it enables us to investigate the security vulnerabilities of the system in a complete and systematic fashion. FMEA stands for Failure Mode Effect and
The careful modeling of the system described in the first four parts of this series requires a great deal of effort by multiple contributors, but one of the benefits is that it enables us to investigate the security vulnerabilities of the system in a complete and systematic fashion. FMEA stands for Failure Mode Effect and
We can do the same thing internally for the system components, for example, in the software operations of the DRE. We can begin to decompose the functions of the voting machine using a SysML activity diagram, as shown in Figure 1. This diagram describes the first part of the test and validation activity before voting
We can do the same thing internally for the system components, for example, in the software operations of the DRE. We can begin to decompose the functions of the voting machine using a SysML activity diagram, as shown in Figure 1. This diagram describes the first part of the test and validation activity before voting
In the first part of the series, we considered the Concept-of-Operations, identifying the system domain and its primary objectives. We also considered the objectives of a Bad Actor who desires to abuse the system. Finally, we brought requirements into the model. Now we will go ahead and start designing the system, following those requirements. We
In the first part of the series, we considered the Concept-of-Operations, identifying the system domain and its primary objectives. We also considered the objectives of a Bad Actor who desires to abuse the system. Finally, we brought requirements into the model. Now we will go ahead and start designing the system, following those requirements. We
Having established the system domain and high-level objectives of our Electronic Voting System (EVS) in Part 1, the typical next step in systems engineering is requirements process in which we generate the requirements that the system must meet. A common pattern here is that requirements are managed in a specialized requirements management tool like DOORS
Having established the system domain and high-level objectives of our Electronic Voting System (EVS) in Part 1, the typical next step in systems engineering is requirements process in which we generate the requirements that the system must meet. A common pattern here is that requirements are managed in a specialized requirements management tool like Jama
Recently I took the opportunity of the INCOSE International Symposium being in Washington DC to consider how modern approaches to Systems Engineering might impact an issue with political and social implications, specifically electronic voting system (EVS) security. It’s impossible to open the newspaper or turn on the TV without hearing something about election security issues.
Recently I took the opportunity of the INCOSE International Symposium being in Washington DC to consider how modern approaches to Systems Engineering might impact an issue with political and social implications, specifically electronic voting system (EVS) security. It’s impossible to open the newspaper or turn on the TV without hearing something about election security issues.