utahpoliticohub.com
iVote, Electronic Voting, and Security: Controlling Access - Utah.Politico.Hub
One of the most important parts of securing any electronic data is making sure that only authorized parties have access to it. This can often be quite a challenge in larger organizations, especially if the user base grows. Assuming voter registration is about the same as it was in 2012, you have to figure out how to secure a system that handles 1.5M total users. Successfully authenticating that many users is quite a challenge, and almost any method used to do so has its pros and cons. Let’s take a…