Threat-Source | Motivation | Threat Actions |
Insiders Doctors, nurses, patients and families | Curiosity Intelligence Monetary gain Unintentional errors | Eavesdropping Fraud and data theft Input of falsified data Sale of personal data System intrusion System sabotage Unauthorised system access |
Outsiders Hackers, companies and governments | Challenge/ego Destruction of information Illegal information disclosure Monetary gain Unauthorised data modification | Information theft Intrusion of privacy Replay, impersonation and interception Spoofing System attacks e.g. denial of service System intrusion System tampering Unauthorised system access |