Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

You studied online voting in this course. List and explain at least 2 ways a vot

ID: 3702416 • Letter: Y

Question

You studied online voting in this course. List and explain at least 2 ways a voting thief could cast/register several votes in an online voting system.

There was an email sent by Mr. Andy Sudduth after the release of famous InternetWorm. The purpose of this email was to explain to network administrators the process to stop the worm. However, this email was of no help to the network administrators. Why? Briefly explain your answer.

Please use you own words No copy from any source , no handwriting and no duplicate answers from the same site ( chegg )

Explanation / Answer

1.)

While there are many ways through which a thief could cast/register votes in an online voting system, the two most prominent ways of doing so are:

Using Fake IPs: In the present context a huge number of Fake Id generators are present which are popularly called VPNs. These can be used by thieves to cast several votes. These VPNs keep on changing the IP addresss of the computer on which they are installed and due to which the server getting the request for vote thinks as if it is a genuine request and authorizes the thief to vote. In this way Fake IPs can be used to cast multiple votes.

Fake Accounts: This is probably the easiest way by which a person can cast multiple votes , what happens now a days is , you can create as many account on any portal as much you want, you just have to provide a mobile number for it and it is well known how easy it is to get a sim card. Now, once the thief accuires a lot of SIM cards he can also create multiple accounts using these SIM card and thus can cast multiple votes using these.

2.)

The famous Internet Worm mentioned in the question is the one that came into light on Nov 2, 1998. This Worm if we may call it so, It was basically a program written by one of the programmers at Harward University. The program made use of the loop holes in the utility programs in systems based on the BSD- versions of the UNIX. These flaws allowed the worm to create copies of the infected file by entering the machine via this loopholes.

Now, by the time Andy Sudduth sent the email to the administrators about the process to stop the worm, this worm had already infected over 60,000 computers in interconnecting networks and unfortunately the systems on which Andy Sudduth and the administrators were interacting was among one of them due to which the mail. Although the computers at Harward were not affected but the computers which the administrators had were affected and they did not have the spare cycle to re route the message so this mail never reached them and hence the mail was of no use to the administrators to eradicate this worm.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote