Why are insider threats difficult to detect?
What is the purpose of user access controls?
What is an insider threat?