Table of Contents Table of Contents
Previous Page  51 / 177 Next Page
Information
Show Menu
Previous Page 51 / 177 Next Page
Page Background

FFI-RAPPORT 16/00707

49

to describe them that way, as this seems implausible considering the current application areas of

the Piql system. We have instead chosen to include the scenarios where the Piql Preservation

Services is not perceived as the direct target, but nonetheless suffer as an indirect effect or

cascade effect. The piqlFilm is simply collateral damage to another attack not directed at it.

Similarly, as the Piql Preservation Services is not the target in these scenarios and there is no

direct threat present, it is difficult for us to give specific recommendations on how to mitigate

that threat. Our only recommendation must therefore be: always be aware of your surroundings.

Avoid high risk occupancies such as close proximity to chemical plants or refineries, or

placement of the piqlVault in a building which is likely to be a terrorist target due to one of the

other occupants, or in a city likely to be the target of a nuclear attack. Other recommendations

regarding the dangers that threaten the Piql Preservation Services in such scenarios, such as fire

protection, fortified walls to withstand tremors or explosives, are covered in the measures

recommended in other safety scenarios.

The scenarios more than often describe a worst case scenario where a vital safety or security

measure is missing. This is simply to illustrate how badly this can damage the Piql Preservation

Services in order to underline the importance of protecting the Piql Preservation Services from

such harm. It does not have to be a complicated or expensive measure: the important thing is

that it is present. Often a minor measure can make all the difference, especially when it comes

to issues regarding security. It can simply be about putting enough (minor) obstacles in the

threat actor’s way to deter them from acting. There is often an easy fix to the problem as well,

e.g. move a vault placed in an area with a higher risk of flooding to a higher floor to avoid flood

damage. One should always take into consideration that such changes can lead to different kinds

of vulnerabilities, such as, in this example, making the vault more vulnerable to the effects of

earthquakes and tremors.

An important delimitation of our scenario analysis is that the scenarios will not examine the

consequences of loss of information, i.e. how this may affect the company storing the

information financially or with regards to its reputation. Our scenario description and analysis

ends once the film is damaged or removed from the piqlVault without authorisation. The

aftermath falls outside the scope of our assignment. Our aim is to assist in the definition of the

safety and security measures that need to be in place to prevent said loss.

Finally, we must make one caveat regarding one of the security properties CIA. Normally, for

the security property availability to be deemed compromised the information in question must

be unavailable at a time when it is urgently needed, i.e. it is both time- and situation specific.

However, as the scenario descriptions in this report are generic, we have found it necessary to

redefine the usage of availability. Therefore, when we conclude that availability has been

compromised in a scenario, we mean that the information simply cannot be accessed –

regardless of the data owner’s need for it.