A Risk Assessment of Piql Services by FFI
Location
Geographical zone: North (North America). The developmental level is high and the political climate is stable.
The piqlVault is situated in an urban area, located centrally in the city.
The scenario takes place in the future, 2244, as it presupposes an imagined situation in which there are sufficient tensions between two highly developed military nations to make armed conflict imminent. The time period is 0-30/50 years, as the value is time-sensitive, i.e. once the military technology is sufficiently outdated it will be of no interest to spy on. The scenario is also a risk for the present, so long as the Piql Preservation Services store information which others are willing to go to great lengths to gain access to. The climate zone is a warm temperate climate. It is spring, in the end of April. The local weather conditions are fairly mild and dry: 12° Celsius with a relative humidity of 69 %. The plant of the malware happens in the middle of the night without being detected. The scenario takes place during the production of the piqlFilm. The setting is therefore the production site, which is situated in a standard office building. The Piql computer, the piqlWriter and the piqlReader are all located in the same large production room, whereas the processing room and equipment is located elsewhere. The productions site is regulated through ventilation to uphold the ISO standards governing levels of humidity and temperature.
Location description
Environment description
Production site description
All safety measures required by Piql AS are in place, see section 5.5.1 for details.
Local safety measures
Local security measures
All security measures required by Piql AS are in place.
Consequences
The physical infrastructure of the building and the storage room is not affected during the incident.
Outer building
The structural integrity of the production site is not affected by the incident. However, the Piql IT system, as part of the Piql Preservation Services, is breached. A state X employee and professional hacker is able, with the full weight and resources of state X behind him/her, to breach the security software of the Front-End code and gain access into the Piql computer system. Here, the client data of state Y is being prepared for transfer over to the computer connected to the piqlWriter,
Production site
147
FFI-RAPPORT 16/00707
Made with FlippingBook - Online magazine maker