Table of Contents Table of Contents
Previous Page  57 / 177 Next Page
Information
Show Menu
Previous Page 57 / 177 Next Page
Page Background

FFI-RAPPORT 16/00707

55

This is because one of the criterions for the parameters is that they should be exhaustive. With

such a width of possible threats to so many phases of the Piql Preservation Services, it was

necessary to start wide in order to narrow it down in the scenario descriptions. Also, we are

using this method to arrive at risk scenarios which describe risks and threat against the Piql

Preservation Services system today but also for 500 years to come. Hence, we cannot simply

assume that the only methods and means that will be used are ones we know of. The values we

have assigned to the parameters are all-encompassing categories, which will be described in the

following. For extended definitions, see appendix A.1.

1.

Actor

: The actor parameter describes the actors who could have the intentions and capacities

to pose a threat to the Piql Preservation Services. The relevant values assigned here are:

-

State

-

Network

-

Company

-

Individual

2.

Goal

: The goal parameter specifies the possible goals that a threat actor would hope to

achieve, or the incentives for their actions towards the Piql Preservation Services. The

relevant values assigned here are:

-

Political power

-

Market power

-

Economic gain

-

Idiosyncratic interest

3.

Method

: The method parameter describes the actions a threat actor would take to achieve

their goals. The methods vary regarding how demanding they are to implement, and thus

represent different levels of ambition and capacity [39 p.13]. The relevant values assigned

here are:

-

Physical destruction

-

Physical manipulation

-

Logical destruction

-

Logical manipulation

-

Insider

4.

Means

: The means parameter describes the relevant resources a threat actor might employ

to implement a given method, their capacities. The specific acts required of the given

method are also briefly touched upon. The relevant values assigned here are:

-

Conventional weapons

-

Non-conventional weapons

-

Hand or power tools

-

Malicious transmitters

-

Software tools

-

Monetary means