They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities.
Threat poses by insiders with authorized access to information or information systems pose as they may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities.