What is the purpose of user access controls?
What is an insider threat?
Why are insider threats difficult to detect?