"A risk assessment of the Piql Services" by FFI

Location

Geographical zone: North (North America). The developmental level is high and the political climate is stable.

The piqlVault is situated in an urban area, located centrally in the city.

The scenario takes place in the future, 2244, as it presupposes an imagined situation in which there are sufficient tensions between two highly developed military nations to make armed conflict imminent. The time period is 0-30/50 years, as the value is time-sensitive, i.e. once the military technology is sufficiently outdated it will be of no interest to spy on. The scenario is also a risk for the present, so long as the Piql Preservation Services store information which others are willing to go to great lengths to gain access to. The climate zone is a warm temperate climate. It is spring, in the end of April. The local weather conditions are fairly mild and dry: 12° Celsius with a relative humidity of 69 %. The plant of the malware happens in the middle of the night without being detected. The scenario takes place during the production of the piqlFilm. The setting is therefore the production site, which is situated in a standard office building. The Piql computer, the piqlWriter and the piqlReader are all located in the same large production room, whereas the processing room and equipment is located elsewhere. The productions site is regulated through ventilation to uphold the ISO standards governing levels of humidity and temperature.

Location description

Environment description

Production site description

All safety measures required by Piql AS are in place, see section 5.5.1 for details.

Local safety measures

Local security measures

All security measures required by Piql AS are in place.

Consequences

The physical infrastructure of the building and the storage room is not affected during the incident.

Outer building

The structural integrity of the production site is not affected by the incident. However, the Piql IT system, as part of the Piql Preservation Services, is breached. A state X employee and professional hacker is able, with the full weight and resources of state X behind him/her, to breach the security software of the Front-End code and gain access into the Piql computer system. Here, the client data of state Y is being prepared for transfer over to the computer connected to the piqlWriter,

Production site

147

FFI-RAPPORT 16/00707

Made with FlippingBook Online newsletter