What is the purpose of user access controls?
Why are insider threats difficult to detect?
What is an insider threat?