Information Technology Reference
In-Depth Information
18.3 Cross References Between Scenarios and Changes
Table 18.1 Summary of scenarios vs. threats countered
Threat
STFC
ESA
UNESCO IRCAM UnivLeeds CIANT
INA
Users may be unable
to understand or use
the data e.g. the seman-
tics, format, processes or
algorithms involved
Non-maintainability of
essential hardware,
software or support
environment may make
the information
inaccessible
The chain of evidence
may be lost and there
may be lack of certainty
of provenance or authen-
ticity
Access and use restric-
tions may make it difficult to
reuse data, or alterna-
tively may not be respec-
ted in future
Loss of ability to iden-
tify the location of data
Not addressed
The current custodian
of the data, whether an
organisation or project,
may cease to exist at
some point in the future
The ones we trust to
look after the digital
holdings may let us
down
Covered by Chap. 25
In their work, each of the testbeds addressed a large number of threats with
many sub-scenarios but we highlight in this table, and in this document, only
those which we believe illustrate the important points.
The scenarios may be classified in a variety of ways, but for convenience in
the following chapters they are presented according to the host organisation. Each
is essentially the report from the testbed and therefore is often written in the first
person.
 
Search WWH ::




Custom Search