Answer:
c. Insider threats.
Step-by-step explanation:
incidents of unauthorized access that involve employees of the organization are known as insider threats. These threats occur when individuals within an organization misuse their access privileges to gain unauthorized access to sensitive information or systems.
Insider threats can take different forms, such as an employee intentionally stealing or leaking confidential data, abusing their privileges to access information they shouldn't have access to, or unintentionally compromising security through negligence or lack of awareness.
It is important for organizations to implement security measures, such as access controls, monitoring systems, and training programs, to detect and prevent insider threats. These measures help to mitigate the risks associated with insider threats and protect the organization's sensitive information and systems.
In summary, incidents of unauthorized access involving employees of the organization are known as insider threats. These threats can have significant impacts on an organization's security and require proactive measures to prevent and detect them.