in Internet by (257k points)

Question: What threat do insiders with authorized access to information or information systems pose?

Please log in or register to answer this question.

1 Answer

0 votes
by (973k points)
selected by
 
Best answer

They may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities.

Threat poses by insiders with authorized access to information or information systems pose as they may wittingly or unwittingly use their authorized access to perform actions that result in the loss or degradation of resources or capabilities.

Related questions

...