Extract - A risk assessment of the Piql Preservation Service

0 Preface3
1 Introduction4
2 The Piql Services4
3 Scope6
4 Definitions7
4.1 Terms related to Risk and Vulnerability Analysis7
4.2 Terms related to Computer Security7
4.3 Terms related to the Scenario-based Approach8
5 Simplifications and Specifications8
5.1 Geography8
6 Scenario method9
6.1 Unintentional events9
6.2 Intentional acts10
6.4 Final selection of scenarios11
8 Presenting the Scenarios12
9 The Vulnerabilities and Security Challenges of the Piql Services14
9.1 Vulnerabilities and Security Challenges identified14
9.1.1 “Out in the Open”14
9.1.2 Inside threat14
9.1.3 Loss of Ideal Storage Conditions15
9.1.4 Fire15
9.1.5 Water15
9.1.7 Jolts and Drops16
9.1.8 Chemical Compounds16
9.1.9 Harmful Microorganisms16
9.1.10 Nuclear Radiation16
9.1.11 Electromagnetic Radiation17
9.1.13 Theft17
9.1.14 Sabotage17
9.1.15 Espionage18
9.1.16 Threats to Computer Security18
10 Alternatives for Digital Storage18
10.1 Existing Digital Storage Technologies18
10.1.1 Hard disk drive (HDD)18
10.1.2 Optical disk18
10.1.3 Magnetic tape (LTO)19
10.3 Long-term preservation When it comes to preservation of digital data – understood as maintaining something in its original state, keeping it alive and safe from harm – the Piql Services is the most appropriate storage method available today. Usin...19
11 Recommendations19
11.1 Recommendations for General Security19
12 Conclusions21
13 Appendix22
13.1 Recommendations by the Norwegian National Security Authority22
13.2 Identified threats & hazards – comments/measures taken by Piql24

Made with FlippingBook flipbook maker