Click "Close" to close Show Text. Click "Print" to print Show Text.

All insiders have some degree of physical or administrative access to the information system. Stress, divorce or financial problems are some examples of what might turn a “trusted” user into an insider threat.