Extract - A risk assessment of the Piql Preservation Service
First page
Table of contents
Next page
Last page
0 Preface
3
1 Introduction
4
2 The Piql Services
4
3 Scope
6
4 Definitions
7
4.1 Terms related to Risk and Vulnerability Analysis
7
4.2 Terms related to Computer Security
7
4.3 Terms related to the Scenario-based Approach
8
5 Simplifications and Specifications
8
5.1 Geography
8
6 Scenario method
9
6.1 Unintentional events
9
6.2 Intentional acts
10
6.4 Final selection of scenarios
11
8 Presenting the Scenarios
12
9 The Vulnerabilities and Security Challenges of the Piql Services
14
9.1 Vulnerabilities and Security Challenges identified
14
9.1.1 “Out in the Open”
14
9.1.2 Inside threat
14
9.1.3 Loss of Ideal Storage Conditions
15
9.1.4 Fire
15
9.1.5 Water
15
9.1.7 Jolts and Drops
16
9.1.8 Chemical Compounds
16
9.1.9 Harmful Microorganisms
16
9.1.10 Nuclear Radiation
16
9.1.11 Electromagnetic Radiation
17
9.1.13 Theft
17
9.1.14 Sabotage
17
9.1.15 Espionage
18
9.1.16 Threats to Computer Security
18
10 Alternatives for Digital Storage
18
10.1 Existing Digital Storage Technologies
18
10.1.1 Hard disk drive (HDD)
18
10.1.2 Optical disk
18
10.1.3 Magnetic tape (LTO)
19
10.3 Long-term preservation When it comes to preservation of digital data – understood as maintaining something in its original state, keeping it alive and safe from harm – the Piql Services is the most appropriate storage method available today. Usin...
19
11 Recommendations
19
11.1 Recommendations for General Security
19
12 Conclusions
21
13 Appendix
22
13.1 Recommendations by the Norwegian National Security Authority
22
13.2 Identified threats & hazards – comments/measures taken by Piql
24
Made with
FlippingBook
flipbook maker