Source: https://www.researchgate.net/publication/221026823_Where_Can_an_Insider_Attack.pdf