The answer to question 01: Authorization The answer to question 02: Generally, malicious that is insiders are trusted users and malicious insiders have existing privileges to work on the network and access resources. The answer to question 03: A logic bomb is a crafted script or program that runs according to specific triggers, usually perpetrated by an insider threat. The answer to question 04: SSO allows users to authenticate once to gain access to different resources.