A Risk Assessment of Piql Services by FFI
meaning that state X has access to both the original files and the prepared file. The hacker installs a spyware which monitors the system and, upon finding something of interest, duplicates that information and transfers it back to a designated database owned by state X. All this is done undetected.
Box
The piqlBox is not affected during the incident.
The information which is being prepared for writing onto a piqlFilm is not damaged or altered in any way, but the information is accessed without authorised permission to the detriment of the data owner.
Film
Power/energy supply
The power supply is not affected during the incident.
Divergence from
The storage conditions of the Piql Preservation Services are not affected during the incident.
ISO standard
Security mechanisms
As the piqlFilms are not damaged or altered during the incident, the data is not lost. The integrity of the piqlFilms thus remains intact.
Integrity
The availability of the piqlFilms is not compromised, as the information is simply copied and not removed or damaged so that the data owner no longer has access to it. The availability of the information thus remains intact. Most importantly for the data owner, the confidentiality of the information about to be written onto the PiqlFilms was irrevocably compromised, as another actor who absolutely should not have had access to its contents did gain access. The loss of confidentiality also resulted in a significant loss of military advantage for the data owner.
Availability
Confidentiality
Immunity (against attacks on the above mentioned)
The Piql Preservation Services is not immune to attacks against confidentiality.
Recommendations
Measures to mitigate against the threat of cyber-attacks include making sure that the security software used by the Piql partners is always state of the art; always keeping the security software up to date so as to secure the Piql IT system from unauthorised intrusion. Piql AS should offer encryption methods as part of their own security architecture to the users which value confidentiality higher than availability (as encryption inevitably results in loss of self-contained).
Recommended protective measures
148
FFI-RAPPORT 16/00707
Made with FlippingBook - Online magazine maker