What is an insider threat?
What is the purpose of user access controls?
Why are insider threats difficult to detect?