With the European Union Parliament elections just around the corner, the EU Agency for Network and Information Security (ENISA) has released a detailed paper discussing the evolving threat of cyber-attacks on election systems and processes.
European Parliamentary elections are to be held in late-May. Notably, this year the European Council agreed at ambassador level to improve EU electoral law and reform laws from the 1976 Electoral Act.
To combat foreign interference such as that witnessed in the US presidential elections in 2016, ENISA is providing guidelines to all election stakeholders.
ENISA, a group of network and information security experts for the EU, helps member states implement relevant EU legislation and works to improve the resilience of Europe”s critical information infrastructure and networks. The center seeks to enhance existing expertise in member states by supporting development of cross-border communities committed to improving network and information security throughout the Union.
According to the document – Election Cybersecurity: Challenges and Opportunities – a democratic society needs a well-protected election lifecycle, from the maintenance of the electoral register and the public political campaigning process to the actual voting and the delivery of the results. In that respect, ENISA offers the following recommendations to all stakeholders:
In a statement on the ENISA website, Executive Director Udo Helmbrech said some EU members have postponed or stopped the use of electronic voting, slightly reducing the risk to the voting process.
“Nonetheless, the public political campaigning process is susceptible to cyber interference. We have witnessed in the past election campaigning processes being compromised due to data leaks,” he said.
“ENISA encourages the EU Member States and key stakeholders such as political parties to partake in more cyber exercises aimed at testing election cybersecurity in order to improve preparedness, understanding, and responding to possible election-related cyber threats and attack scenarios. These stakeholders should have incident response plans in place, in the event that they become a victim of data leaks.”
tags
Filip has 15 years of experience in technology journalism. In recent years, he has turned his focus to cybersecurity in his role as Information Security Analyst at Bitdefender.
View all postsDecember 24, 2024
December 19, 2024
November 14, 2024