"A risk assessment of the Piql Services" by FFI

Location

Geographical zone: Middle (Middle East). The region was rich in oil resources, with many oil fields which can be potential lucrative sites for oil drilling again. The developmental level is not very high, and construction techniques are not very modern or advanced.

The piqlVault is situated in an urban area, right in the city centre.

Location description

The scenario takes place in the future, 2157, as it presupposes an imagined situation in which oil is scarce, but no alternative energy source has yet been discovered. The time period is 0-30/50 years, as the user is business sensitive. The scenario is also a risk in the present, so long as the Piql Preservation Services store information which others are willing to go to great lengths to gain access to. The climate zone is hot desert with very little precipitation. It is spring, the beginning of May. The local weather conditions are fairly hot and dry: 25° Celsius with a relative humidity of 38 %. The incident occurs late afternoon, when there are fewer people in the piqlVault than during the busy hours of midday. The scenario takes place while the piqlFilm is in storage in the piqlVault. The piqlVault system is placed in a storage room located in basement of an office building. The vault is regulated through ventilation to uphold the ISO standards governing levels of humidity and temperature. All safety measures required by Piql AS are in place, see section 5.5.1 for details. However, the developmental level is not the highest, which is reflected in the sophistication level of the implementation.

Environment description

Vault description

Local safety measures

Local security measures

All security measures required by Piql AS are in place.

Consequences

The physical infrastructure of the building and the storage room is not affected.

Outer building

The structural integrity of the piqlVault system is not affected during the theft. However, the piqlVault system is the part of the Piql Preservation Services which is breached. A high level employee with complete login access to the system is able to use the EWMS to retrieve the relevant piqlFilms. Though the EWMS only stores the reel IDs of the piqlFilms, as this was an insider theft, the operator already knew which ID number corresponded to the piqlFilms of interest to the rival oil company X. The transaction is logged, as all transactions are in the EWMS, which ultimately leads to the capture of the operator in question. Yet, as there

Vault

134

FFI-RAPPORT 16/00707

Made with FlippingBook Online newsletter