Modern society is heavily dependent from cyberspace and cybersecurity. Governments and States are using technology to push e-voting systems into citizen's lives in order to involve them in political processes. But although the world has reached a very high level of technological development, it is still not secure in the context of cybersecurity. Ensuring cybersecurity in the process of designing and operating electronic voting systems is one of the most important aspects for successful implementation of electronic voting in Lithuania. After summarizing the reviewed literature and the results obtained during the empirical research, a cybersecurity management model for the implementation of electronic voting systems was created. The implementation of the cybersecurity management model that has been created in this doctoral thesis will ensure successful implementation and cybersecurity of electronic voting systems.
Modern society is heavily dependent from cyberspace and cybersecurity. Governments and States are using technology to push e-voting systems into citizen's lives in order to involve them in political processes. But although the world has reached a very high level of technological development, it is still not secure in the context of cybersecurity. Ensuring cybersecurity in the process of designing and operating electronic voting systems is one of the most important aspects for successful implementation of electronic voting in Lithuania. After summarizing the reviewed literature and the results obtained during the empirical research, a cybersecurity management model for the implementation of electronic voting systems was created. The implementation of the cybersecurity management model that has been created in this doctoral thesis will ensure successful implementation and cybersecurity of electronic voting systems.
Around all over the world, at this moment, there is one main problem, while government organizations are organizing general elections or referendums. Problem is that citizens are very apathetic and their participation in elections and referendums are very low. Elections and referendums which are based on traditional election system, using paper ballots, are uncomfortable for a lot of citizens, which have election right, because it's not very comfortable or possible to reach voting poll's on an election day. In this case the participation of citizens is very low, because it's not always possible to visit polling stations when the distance to it is quiet big or citizen have no time to vote. This problem is very urgent in Lithuania to. One of the easiest ways to increase participation of citizens in country political processes is creation of electronical voting systems which can be used to cast citizen vote remotely or not. Because of opinion that e-voting systems will be more convenient for the voters and this will increase voters turnout on elections and referendums, governments of some countries are trying to create and begin to use those systems on their countries general elections and referendums. This paper work is representing the standards and main aspects of creation of the e-voting systems and main threats to electronical voting systems. It discusses about system attack methods and people which are interested in e-voting systems compromising. Also it analyzes the practice of using e-voting systems for elections and referendums in some world countries. One of the paper work aims was to analyze Lithuanian e-voting system conception and try to offer the e-voting system, which can be used in Lithuanian elections and referendums, model. The main aim of this work was to make a research which can help to understand, what Lithuanian society thinks about e-voting system creation and future plans to use it in Lithuanian elections and referendums and will it be possible, that e-voting system use in Lithuania will increase citizens participation in elections and referendums.
Around all over the world, at this moment, there is one main problem, while government organizations are organizing general elections or referendums. Problem is that citizens are very apathetic and their participation in elections and referendums are very low. Elections and referendums which are based on traditional election system, using paper ballots, are uncomfortable for a lot of citizens, which have election right, because it's not very comfortable or possible to reach voting poll's on an election day. In this case the participation of citizens is very low, because it's not always possible to visit polling stations when the distance to it is quiet big or citizen have no time to vote. This problem is very urgent in Lithuania to. One of the easiest ways to increase participation of citizens in country political processes is creation of electronical voting systems which can be used to cast citizen vote remotely or not. Because of opinion that e-voting systems will be more convenient for the voters and this will increase voters turnout on elections and referendums, governments of some countries are trying to create and begin to use those systems on their countries general elections and referendums. This paper work is representing the standards and main aspects of creation of the e-voting systems and main threats to electronical voting systems. It discusses about system attack methods and people which are interested in e-voting systems compromising. Also it analyzes the practice of using e-voting systems for elections and referendums in some world countries. One of the paper work aims was to analyze Lithuanian e-voting system conception and try to offer the e-voting system, which can be used in Lithuanian elections and referendums, model. The main aim of this work was to make a research which can help to understand, what Lithuanian society thinks about e-voting system creation and future plans to use it in Lithuanian elections and referendums and will it be possible, that e-voting system use in Lithuania will increase citizens participation in elections and referendums.
All over the world there is one main problem for government organizations in organizing general elections or referendums. (e problem is that citizens are very apathetic and their participation in elections and referendums is very low. (e elections and referendums, which are based on the traditional election system, use paper ballots which are inconvenient for a lot of citizens who have election rights, because it's not very comfortable or possible to reach voting polls on election day. In this case the participation of citizens is very low, because it's not always possible to visit polling stations when the distance to it is quite far or citizens have no time to vote. One of the easiest ways to increase participation of citizens in the country political processes is creation of electronic voting systems that can be used to cast citizen votes both remotely or not. Because of the opinion that e-voting systems will be more convenient for voters and that this will increase voter turnout on elections and referendums, governments of some countries are trying to create and begin to use those systems in their countries' general elections and referendums. This scientic paper represents the standards and main aspects of creation of e-voting systems, models and the main threats to electronic voting systems. It discusses system attack methods and people who are interested in compromising e-voting systems. Also it analyses the practice of using e-voting systems for elections and referendums in some world countries. ; Anotacija. Tikslas – išanalizuoti elektroninių rinkimų sistemų konstravimo principus, elektroninių rinkimų sistemų modelių kūrimo ir diegimo ypatumus, atskleisti elektroninių rinkimų pažeidimo metodus bei jų apsaugos užtikrinimo galimybes. Metodologija – nagrinėjant anksčiau nurodytus elektroninių rinkimų sistemų konstravimo principus ir elektroninių rinkimų sistemų modelius, taikyti sisteminės analizės bei koncepcinės lyginamosios analizės metodai leidžia geriau atskleisti elektroninių rinkimų pažeidimų metodus bei nustatyti jų technologinės apsaugos užtikrinimo priemones. Rezultatai – atskleisti elektroninių rinkimų sistemų pagrindiniai kūrimo, konstravimo principai, atlikta elektroninių rinkimų sistemų modelių lyginamoji analizė, sudaranti prielaidas kurti, plėtoti naujus modelius šioje srityje bei taikyti naujas ir efektyvias elektroninių rinkimų sistemų apsaugos nuo galimų pažeidimų priemones, laiku sukurti apsaugos nuo šių pažeidimų tarptautinius ir nacionalinius standartus. Praktinė reikšmė – atlikus elektroninių rinkimų sistemų kontstravimo principų sisteminę analizę bei lyginamuoju aspektu išanalizavus elektroninių rinkimų sistemų modelius išryškėję tam tikri privalumai ir trūkumai leistų efektyviau į įvairių šalių valstybės valdymo sistemas integruoti naujai kuriamus elektroninių rinkimų modelius, apibrėžiant šių modelių taikymo ypatumus svarbiausiuose strateginuose dokumentuose ir kituose nacionaliniuose teisės aktuose. Originalumas – darbo originalumą straipsnyje atspindi elektroninių rinkimų sistemų konstravimo ypatumų sisteminė analizė, išskiriant šešis pagrindinius bendruosius ir svarbiausius šių sistemų konstravimo principus, įvairių pasaulio mokslininkų sukurtų ir siūlomų elektroninių balsavimo (rinkimų) sistemų modelių koncepcinė analizė, šių modelių bendrųjų privalumų ir trūkumų išskyrimas lyginamuoju aspektu. Mokslinio straipsnio originalumas taip pat atsispindi elektroninių rinkimų modelių įgyvendinimo kontekste analizuojant aktualius klausimus, susijusius su grėsmėmis, kylančiomis elektroninių rinkimų sistemoms ir galimiems šių sistemų kompromitavimo metodams. Tyrimo tipas – e. rinkimų sistemų konstravimo principų, modelių ir šių sistemų pažeidimų bei apsaugos problematikos pristatymas.
International audience ; The purpose of the paper is to analyze the vulnerabilities of Critical Energy Infrastructures' systems in the event of cyber-attack. The global tendency of cyber-attacks puts Critical Energy Infrastructures on one of the first places for targets. Critical Infrastructure Protection (CIP) has become an increasingly relevant topic in the global industrial environment, as the consequences of cyber-attacks toward ICS can result in physical disruption and loss of human lives. The analysis presented in the paper will take into consideration three different case scenarios of cyber-attacks to Critical Energy Infrastructures, and will evaluate the outcomes and the tactics used by the organizations' response and recovery.
Cyber security is the most critical aspect nowadays of our technologically based lives. Government institutions, banking sectors, public and private services, nuclear power plants, power grid operators, water suppliers or waste water treatment companies use information technologies in their day-to-day operations. Everything that uses technologies are based on communication and information systems and that means that it depends on cyber security. The public and private sector each year spend millions of dollars on technologies, security software and hardware devices that will increase the cyber security inside their companies, but they are still vulnerable. The main problem of this situation is that cyber security is still usually treated as a technical aspect or technology which can be easily implemented inside the organization and this implementation will guarantee cyber security. This attitude must change, because cyber security nowadays is something more than just the technology. This article presents the taxonomy of the critical infrastructure attacks, analyzes attack vectors and attack methods used to damage critical infrastructure as well as the most common cyber security mistakes which organizations make in the cyber security field when trying to make themselves safer from vulnerabilities. The main aim of this article is to provide theoretical aspects of the cyber security management model which can be used to ensure security of critical infrastructure in an organization or company. The cyber security management model that is presented in this article is analyzed from management perspectives and is not concerned with technological aspects and products that are used to protect critical infrastructure from cyber security attacks and vulnerabilities.
Cyber security is the most critical aspect nowadays of our technologically based lives. Government institutions, banking sectors, public and private services, nuclear power plants, power grid operators, water suppliers or waste water treatment companies use information technologies in their day-to-day operations. Everything that uses technologies are based on communication and information systems and that means that it depends on cyber security. The public and private sector each year spend millions of dollars on technologies, security software and hardware devices that will increase the cyber security inside their companies, but they are still vulnerable. The main problem of this situation is that cyber security is still usually treated as a technical aspect or technology which can be easily implemented inside the organization and this implementation will guarantee cyber security. This attitude must change, because cyber security nowadays is something more than just the technology. This article presents the taxonomy of the critical infrastructure attacks, analyzes attack vectors and attack methods used to damage critical infrastructure as well as the most common cyber security mistakes which organizations make in the cyber security field when trying to make themselves safer from vulnerabilities. The main aim of this article is to provide theoretical aspects of the cyber security management model which can be used to ensure security of critical infrastructure in an organization or company. The cyber security management model that is presented in this article is analyzed from management perspectives and is not concerned with technological aspects and products that are used to protect critical infrastructure from cyber security attacks and vulnerabilities.
Cyber security is the most critical aspect nowadays of our technologically based lives. Government institutions, banking sectors, public and private services, nuclear power plants, power grid operators, water suppliers or waste water treatment companies use information technologies in their day-to-day operations. Everything that uses technologies are based on communication and information systems and that means that it depends on cyber security. The public and private sector each year spend millions of dollars on technologies, security software and hardware devices that will increase the cyber security inside their companies, but they are still vulnerable. The main problem of this situation is that cyber security is still usually treated as a technical aspect or technology which can be easily implemented inside the organization and this implementation will guarantee cyber security. This attitude must change, because cyber security nowadays is something more than just the technology. This article presents the taxonomy of the critical infrastructure attacks, analyzes attack vectors and attack methods used to damage critical infrastructure as well as the most common cyber security mistakes which organizations make in the cyber security field when trying to make themselves safer from vulnerabilities. The main aim of this article is to provide theoretical aspects of the cyber security management model which can be used to ensure security of critical infrastructure in an organization or company. The cyber security management model that is presented in this article is analyzed from management perspectives and is not concerned with technological aspects and products that are used to protect critical infrastructure from cyber security attacks and vulnerabilities.
The modern world could not be imagined without the information and communications technology. Today's society, its life and social relations are deeply influenced by the virtual space, and that stands as a reason why the world's Information Technology specialists and representatives of various branches of science have been focusing on solving the problems in the sphere of cyber security. Software and technological solutions used in reorganization of the activity of private sector nowadays are widely used in the public sector as well. By using technologies, countries put their effort into involving their citizens into the process of governance and direct participation in various political processes inside the state itself, and one of the most widespread tools to motivate the citizen-to-state political participation and resident's direct interaction in political processes is internet voting. Authors of scientific literature investigate how cybersecurity management is being comprehended and analyzed in technological, legal, management, economical, human resource management and other aspects; how cyber security is analyzed in the context of services provided by institutions of public administration; which means of cyber security management are essential, in order to speed up the processes of establishing e-voting systems. In this article the authors investigate the theoretical aspects of cyber security management in internet voting, analyze the global experience in the sphere of cyber security management implementationwith the help of already established e-voting systems, evaluate the properties of cyber security management in the process of implementation of internet voting in Lithuania, as well as present audience with an in-depth analysis of the opinion of the local population, cyber security and voting system specialists, concerning the matters and possibilities of establishing internet voting in Lithuania. The authors also propose a cyber security management model, which could be used in the process of implementation (both preparation and establishment) of the internet voting system in Lithuania
International audience ; The modern world could not be imagined without the information and communications technology. Today's society, its life and social relations are deeply influenced by the virtual space, and that stands as a reason why the world's Information Technology specialists and representatives of various branches of science have been focusing on solving the problems in the sphere of cyber security. Software and technological solutions used in reorganization of the activity of private sector nowadays are widely used in the public sector as well. By using technologies, countries put their effort into involving their citizens into the process of governance and direct participation in various political processes inside the state itself, and one of the most widespread tools to motivate the citizen-to-state political participation and resident's direct interaction in political processes is internet voting. Authors of scientific literature investigate how cybersecurity management is being comprehended and analyzed in technological, legal, management, economical, human resource management and other aspects; how cyber security is analyzed in the context of services provided by institutions of public administration; which means of cyber security management are essential, in order to speed up the processes of establishing e-voting systems. In this article the authors investigate the theoretical aspects of cyber security management in internet voting, analyze the global experience in the sphere of cyber security management implementation with the help of already established e-voting systems, evaluate the properties of cyber security management in the process of implementation of internet voting in Lithuania, as well as present audience with an in-depth analysis of the opinion of the local population, cyber security and voting system specialists, concerning the matters and possibilities of establishing internet voting in Lithuania. The authors also propose a cyber security management model, which could be used ...
The modern world could not be imagined without the information and communications technology. Today's society, its life and social relations are deeply influenced by the virtual space, and that stands as a reason why the world's Information Technology specialists and representatives of various branches of science have been focusing on solving the problems in the sphere of cyber security. Software and technological solutions used in reorganization of the activity of private sector nowadays are widely used in the public sector as well. By using technologies, countries put their effort into involving their citizens into the process of governance and direct participation in various political processes inside the state itself, and one of the most widespread tools to motivate the citizen-to-state political participation and resident's direct interaction in political processes is internet voting. Authors of scientific literature investigate how cybersecurity management is being comprehended and analyzed in technological, legal, management, economical, human resource management and other aspects; how cyber security is analyzed in the context of services provided by institutions of public administration; which means of cyber security management are essential, in order to speed up the processes of establishing e-voting systems. In this article the authors investigate the theoretical aspects of cyber security management in internet voting, analyze the global experience in the sphere of cyber security management implementation with the help of already established e-voting systems, evaluate the properties of cyber security management in the process of implementation of internet voting in Lithuania, as well as present audience with an in-depth analysis of the opinion of the local population, cyber security and voting system specialists, concerning the matters and possibilities of establishing internet voting in Lithuania. The authors also propose a cyber security management model, which could be used in the process of implementation (both preparation and establishment) of the internet voting system in Lithuania.
The modern world could not be imagined without the information and communications technology. Today's society, its life and social relations are deeply influenced by the virtual space, and that stands as a reason why the world's Information Technology specialists and representatives of various branches of science have been focusing on solving the problems in the sphere of cyber security. Software and technological solutions used in reorganization of the activity of private sector nowadays are widely used in the public sector as well. By using technologies, countries put their effort into involving their citizens into the process of governance and direct participation in various political processes inside the state itself, and one of the most widespread tools to motivate the citizen-to-state political participation and resident's direct interaction in political processes is internet voting. Authors of scientific literature investigate how cybersecurity management is being comprehended and analyzed in technological, legal, management, economical, human resource management and other aspects; how cyber security is analyzed in the context of services provided by institutions of public administration; which means of cyber security management are essential, in order to speed up the processes of establishing e-voting systems. In this article the authors investigate the theoretical aspects of cyber security management in internet voting, analyze the global experience in the sphere of cyber security management implementation with the help of already established e-voting systems, evaluate the properties of cyber security management in the process of implementation of internet voting in Lithuania, as well as present audience with an in-depth analysis of the opinion of the local population, cyber security and voting system specialists, concerning the matters and possibilities of establishing internet voting in Lithuania. The authors also propose a cyber security management model, which could be used in the process of implementation (both preparation and establishment) of the internet voting system in Lithuania.