Why are insider threats difficult to detect?
What is an insider threat?
What is the purpose of user access controls?