

FFI-RAPPORT 16/00707
55
This is because one of the criterions for the parameters is that they should be exhaustive. With
such a width of possible threats to so many phases of the Piql Preservation Services, it was
necessary to start wide in order to narrow it down in the scenario descriptions. Also, we are
using this method to arrive at risk scenarios which describe risks and threat against the Piql
Preservation Services system today but also for 500 years to come. Hence, we cannot simply
assume that the only methods and means that will be used are ones we know of. The values we
have assigned to the parameters are all-encompassing categories, which will be described in the
following. For extended definitions, see appendix A.1.
1.
Actor
: The actor parameter describes the actors who could have the intentions and capacities
to pose a threat to the Piql Preservation Services. The relevant values assigned here are:
-
State
-
Network
-
Company
-
Individual
2.
Goal
: The goal parameter specifies the possible goals that a threat actor would hope to
achieve, or the incentives for their actions towards the Piql Preservation Services. The
relevant values assigned here are:
-
Political power
-
Market power
-
Economic gain
-
Idiosyncratic interest
3.
Method
: The method parameter describes the actions a threat actor would take to achieve
their goals. The methods vary regarding how demanding they are to implement, and thus
represent different levels of ambition and capacity [39 p.13]. The relevant values assigned
here are:
-
Physical destruction
-
Physical manipulation
-
Logical destruction
-
Logical manipulation
-
Insider
4.
Means
: The means parameter describes the relevant resources a threat actor might employ
to implement a given method, their capacities. The specific acts required of the given
method are also briefly touched upon. The relevant values assigned here are:
-
Conventional weapons
-
Non-conventional weapons
-
Hand or power tools
-
Malicious transmitters
-
Software tools
-
Monetary means