,Inhoudsopgave
1. Inleiding......................................................................................................................................3
1.1. Aanleiding ...........................................................................................................................3
1.2. Doel.....................................................................................................................................3
2. Beschrijving van de situatie & knelpunten .................................................................................4
2.1. De probleemstelling ............................................................................................................4
2.2. Insider threats .....................................................................................................................4
2.3. Knelpunten ..........................................................................................................................4
3. Evaluatie van de situatie ............................................................................................................5
3.1. Huidige situatie: De omvang en ernst van insider threats .....................................................5
3.2. Verwachte situatie: Hoe zullen insider threats zich gaan ontwikkelen in de toekomst? ........5
3.3. Wat is er tot nu toe gedaan tegen insider threats? ..............................................................5
4. De gewenste situatie ..................................................................................................................6
4.1. Wat wil ik bereiken? ............................................................................................................6
4.2. Randvoorwaarden ...............................................................................................................6
4.3. Dilemma ..............................................................................................................................6
5. Conclusie & advies ......................................................................................................................7
5.1. Conclusie .............................................................................................................................7
5.2. Advies .................................................................................................................................7
6. Mogelijke maatregelen...............................................................................................................8
6.1. Kortetermijnmaatregelen ....................................................................................................8
6.2. Langetermijnmaatregelen....................................................................................................8
6.3. De beste maatregel .............................................................................................................8
7. Beoordeling van de maatregelen................................................................................................9
8. Hoe verder? .............................................................................................................................. 10
9. Literatuurlijst ............................................................................................................................ 11
10. Bijlagen ................................................................................................................................. 15
10.1. Uitgevoerde dreigingsanalyse (risicomatrix) ................................................................... 15
10.2. Cijfers over insider threats ............................................................................................. 16
10.3. Insider threats ............................................................................................................... 17
10.4. Knelpunten insider threats............................................................................................. 18
10.5. Google Waymo-Uber Case & Tesla Insider Data Breach ................................................. 20
10.6. Lijst met insider-incidenten............................................................................................ 21
10.7. Huidige situatie: De omvang en ernst van insider threats ............................................... 22
10.8. 112-storing KPN 2019 .................................................................................................... 23
10.9. Verwachte situatie: Hoe zullen insider threats zich gaan ontwikkelen in de toekomst? .. 24
1
, 10.10. Wat is er tot nu toe gedaan tegen insider threats? ......................................................... 25
10.11. Randvoorwaarden ......................................................................................................... 26
10.12. Maatregelen .................................................................................................................. 27
10.12.1 Beoordeling van de maatregelen .................................................................................. 28
10.12.2. SMART-uitwerking van de maatregelen ....................................................................... 29
2
1. Inleiding......................................................................................................................................3
1.1. Aanleiding ...........................................................................................................................3
1.2. Doel.....................................................................................................................................3
2. Beschrijving van de situatie & knelpunten .................................................................................4
2.1. De probleemstelling ............................................................................................................4
2.2. Insider threats .....................................................................................................................4
2.3. Knelpunten ..........................................................................................................................4
3. Evaluatie van de situatie ............................................................................................................5
3.1. Huidige situatie: De omvang en ernst van insider threats .....................................................5
3.2. Verwachte situatie: Hoe zullen insider threats zich gaan ontwikkelen in de toekomst? ........5
3.3. Wat is er tot nu toe gedaan tegen insider threats? ..............................................................5
4. De gewenste situatie ..................................................................................................................6
4.1. Wat wil ik bereiken? ............................................................................................................6
4.2. Randvoorwaarden ...............................................................................................................6
4.3. Dilemma ..............................................................................................................................6
5. Conclusie & advies ......................................................................................................................7
5.1. Conclusie .............................................................................................................................7
5.2. Advies .................................................................................................................................7
6. Mogelijke maatregelen...............................................................................................................8
6.1. Kortetermijnmaatregelen ....................................................................................................8
6.2. Langetermijnmaatregelen....................................................................................................8
6.3. De beste maatregel .............................................................................................................8
7. Beoordeling van de maatregelen................................................................................................9
8. Hoe verder? .............................................................................................................................. 10
9. Literatuurlijst ............................................................................................................................ 11
10. Bijlagen ................................................................................................................................. 15
10.1. Uitgevoerde dreigingsanalyse (risicomatrix) ................................................................... 15
10.2. Cijfers over insider threats ............................................................................................. 16
10.3. Insider threats ............................................................................................................... 17
10.4. Knelpunten insider threats............................................................................................. 18
10.5. Google Waymo-Uber Case & Tesla Insider Data Breach ................................................. 20
10.6. Lijst met insider-incidenten............................................................................................ 21
10.7. Huidige situatie: De omvang en ernst van insider threats ............................................... 22
10.8. 112-storing KPN 2019 .................................................................................................... 23
10.9. Verwachte situatie: Hoe zullen insider threats zich gaan ontwikkelen in de toekomst? .. 24
1
, 10.10. Wat is er tot nu toe gedaan tegen insider threats? ......................................................... 25
10.11. Randvoorwaarden ......................................................................................................... 26
10.12. Maatregelen .................................................................................................................. 27
10.12.1 Beoordeling van de maatregelen .................................................................................. 28
10.12.2. SMART-uitwerking van de maatregelen ....................................................................... 29
2