A Risk Assessment of Piql Services by FFI

meaning that state X has access to both the original files and the prepared file. The hacker installs a spyware which monitors the system and, upon finding something of interest, duplicates that information and transfers it back to a designated database owned by state X. All this is done undetected.

Box

The piqlBox is not affected during the incident.

The information which is being prepared for writing onto a piqlFilm is not damaged or altered in any way, but the information is accessed without authorised permission to the detriment of the data owner.

Film

Power/energy supply

The power supply is not affected during the incident.

Divergence from

The storage conditions of the Piql Preservation Services are not affected during the incident.

ISO standard

Security mechanisms

As the piqlFilms are not damaged or altered during the incident, the data is not lost. The integrity of the piqlFilms thus remains intact.

Integrity

The availability of the piqlFilms is not compromised, as the information is simply copied and not removed or damaged so that the data owner no longer has access to it. The availability of the information thus remains intact. Most importantly for the data owner, the confidentiality of the information about to be written onto the PiqlFilms was irrevocably compromised, as another actor who absolutely should not have had access to its contents did gain access. The loss of confidentiality also resulted in a significant loss of military advantage for the data owner.

Availability

Confidentiality

Immunity (against attacks on the above mentioned)

The Piql Preservation Services is not immune to attacks against confidentiality.

Recommendations

Measures to mitigate against the threat of cyber-attacks include making sure that the security software used by the Piql partners is always state of the art; always keeping the security software up to date so as to secure the Piql IT system from unauthorised intrusion. Piql AS should offer encryption methods as part of their own security architecture to the users which value confidentiality higher than availability (as encryption inevitably results in loss of self-contained).

Recommended protective measures

148

FFI-RAPPORT 16/00707

Made with FlippingBook - Online magazine maker