Furthermore, the objectives of both categories of cyber attackers
are often the same (e.g., data exfiltration). In our view, it is
becoming increasingly more challenging to segregate insider
threat attacks against other threat vectors which comprise the
entire threatscape (e.g., external and APT attacks). Throughout
the paper, we will emphasize the symbiotic relationship which
exists between the three threat vectors (External, Insider and
APT).