Table of Contents Table of Contents
Previous Page  19 / 177 Next Page
Information
Show Menu
Previous Page 19 / 177 Next Page
Page Background

FFI-RAPPORT 16/00707

17

3 Scope

The Piql Preservation Services is a complex system, with several components with various

features, and both a production and a storage phase. When we recall that Piql AS’ vision for the

system is both universal and global, and we add to that a time perspective of 500 years, we

begin to comprehend the complexity of the Piql Preservation Services and thus the intricacy of

doing a risk assessment of this system. Because of this complexity it is necessary to limit the

field of our risk assessment. First, however, it is pertinent to outline what is meant by risk

assessment. Yet, before explaining our approach to doing a risk assessment, we must clarify

some term usage. In this report, we are using the term

risk assessment

, not threat assessment or

threat analysis. The term risk covers both intentional acts and unintentional events and does not

therefore risk excluding the latter, as the term threat can do. Additionally, according to the

definition we follow here, an analysis is only a small part of an assessment, and we aim to

evaluate more than would be covered by an analysis.

Risk assessments, be it for a product or a business model, are a method to better manage risks.

Knowing which threats or hazards may harm our objectives and which vulnerabilities our values

have can allow security measures to be put in place, which lets us control the risk and determine

it at a level which is found acceptable and tolerable. By including a risk assessment as part of a

R&D project, Piql AS ensures that risks are identified early in the development process of the

system, so that new or modified design and manufacturing requirements for version two of the

piqlFilm and -Box can be implemented. Moreover, security parameters surrounding the

piqlVault can also be recommended to the end users.

Different approaches to risk assessment and how best to apply them in real life is a contested

issue in the field of societal security and preparedness. There are two main approaches used in

Norway:

1

the NS 5814, which is based on SN-ISO Guide 73:2009 [5], and the newer NS 5832

[6]. They are in part competing approaches, and there is a lot of discussion in different work and

research environments as to which is the better one to use. FFI has also been instrumental in this

discussion, recently completing a thorough study on the subject specifically on the merit of the

different approaches when it comes to preparing for unwanted intentional acts [7]. Their

conclusion is, not surprisingly, that both approaches have their strengths and weaknesses, and

that they can – and perhaps should – complement each other for a better result.

We will use the more scientifically founded terminology of the NS 5814 as the general

framework for our risk assessment approach. Within this framework, however, we incorporate

the three factor model presented in the NS 5832 into the analysis, which captures the

relationship between value, threat and vulnerability. This value-oriented thinking is essential to

this risk assessment. In order to develop a product for the targeted application areas which in a

security context is adapted to the market’s needs, we need to start by gaining an understanding

of which assets each application area needs protected, i.e. what type of information and the

1

Norway is used as a frame of reference, as this is where we have the most experience. The standards used are also representative of

other national standards.