Table of Contents Table of Contents
Previous Page  56 / 177 Next Page
Information
Show Menu
Previous Page 56 / 177 Next Page
Page Background

54

FFI-RAPPORT 16/00707

Failure/malfunction:

Harmful emission

o

Chemical

o

Biological

o

Radioactive

Conventional accidents

o

Explosions/fire

o

Structural collapse

o

Transport accident

Failure of service or utility supply

o

Failure of vital infrastructure

o

Failure of vital societal functions

All of the events identified to have an impact on the security of a nation are also relevant risks

to the Piql Preservation Services. Hence, they will form part of the sample space when the final

selection of scenario classes is chosen and the specific scenarios descriptions are written out.

6.3.2

Applied to Issues of Security

Morphological analysis works well with events caused by intentional acts, deliberation and

calculation. We have here created our own morphological box adapted to the problem in the

report.

The process is separated into two phases: the analysis phase and the synthesis phase. We must

begin with the first step of the analysis phase, which is to concisely define the problem. In this

report a relevant question/problem would be:

What are all intentional threats and challenges

that the Piql Preservation Services may face today and for 500 years to come?

The next step is to define the parameters which best characterise the problem we have defined in

the preceding step. As we focus on intentional acts, the threats would have to be directed at the

Piql Preservation Services itself, apart from nuclear war and terrorism as explained previously.

A logical place to start is therefore to characterise the threat actors with an interest in attacking

the Piql Preservation Services, their intentions and capacities.

Hence, the following parameters were defined:

-

Actor

-

Goal

-

Method

-

Means

The next step is to assign a range of relevant values, or conditions, that each parameter might

have. Here it is very important to define the values very clearly. The values should be mutually

exclusive and exhaustive for the given parameter in accordance with the problem. We have

made broad assumptions and cast wide nets when it comes to our parameters and definitions.