Authorized users with privileged access who misuse the corporate information assets and directly affects the confidentiality, integrity, and availability of the assets are known as:
A. Outsider threats
B. Social Engineers
C. Insider threats
D. Zombies