Table of Contents Table of Contents
Previous Page  84 / 177 Next Page
Information
Show Menu
Previous Page 84 / 177 Next Page
Page Background

82

FFI-RAPPORT 16/00707

Unlike sabotage, there are limited ways a threat actor could conduct logical espionage of the

Piql Preservation Services. The first alternative is to install spyware in the Piql IT system. It

would only be necessary to get past the security code in the Front-End service before they

would have access to potentially valuable client information being prepared for writing. After

having gained this unauthorised access, the spyware could view and extract the relevant pieces

of information for later reading by unauthorised persons. The act of espionage does not

necessitate the instalment of malware which alters or somehow damages the information, so its

integrity would remain intact. The confidentiality of the information, however, is grossly

compromised. It can be bad enough that the information is accessed and read by someone else,

but worse still is that we can assume the threat actor now privy to the information is someone

the data owner least of all wanted to have access.

The same loss of confidentiality would be the result when the second alternative is used. Spying

on the contents of the Piql Preservation Services can also take the form of a threat actor using

transmitters and receivers from outside the facility to gather information as it is transferred

electronically.

9.1.16

Threats to Computer Security

We have previously in this chapter alluded to risks related to the operational IT system security

architecture which will be implemented by Piql partners. These are especially present during the

production phase, but some also during storage. The system architecture was laid out in chapter

5. Here, we point to possible weaknesses or holes in the setup which a threat actor with abilities

to perform logical attacks may exploit to gain access to the system. Though we stressed that the

security mechanisms demanded of the Piql partners by Piql AS are relatively strong, there are

three weak points we would like to consider in the Piql IT system.

Firstly, there is the issue of the security code of the Front-End service. It is nearly impossible for

FFI to analyse the reliability of the different security software employed here, especially when

considering our 500 year perspective. Within the digital world, these things are extremely

volatile, and software solutions are constantly tweaked and evolving as a result. The security

software in Piql AS’ system architecture may change in just a few years, and perhaps very soon

the HTTPS protocol for secure connection which many of us are accustomed to now may be

obsolete. The best the Piql partners can do is always strive to keep up with the latest

developments in the technology, update their software regularly, run the Piql Preservation

Services in a professional way so as to instil trust, and maintain the best way of operations as

possible. Some of these instructions we will come back to later in the next chapter concerning

recommendations. Always keeping the security software state of the art, as the current setup is,

is a way to ensure that the Front-End service is as impenetrable as can be.

The second vulnerability was illustrated in the scenario describing sabotage, namely how a

threat actor can gain access to the entire Piql computer system, not just the computer connected

to the outside world with the external interface accessible to clients, to tamper with and alter the

digital information stored in the system before printing. The reader will remember that the Piql

IT system consists primarily of a Piql (reception and processing) computer and a Piql I/O