Understanding and Detecting the Malicious Insider These days, most people you meet will be well aware of the prevalence of typical threats such as