The document discusses insider threats and fraud, providing examples of different types including financial theft, intellectual property theft, sabotage, and privacy breaches. It outlines a scenario where an employee named Alice at M&B Bank engages in all four types of insider abuse over 12 months by stealing funds, stealing customer data, planting a logic bomb, and emailing customer information externally. Barriers to preventing insider threats are discussed, noting trusted insiders have legitimate access, knowledge of systems, and ability to observe security controls.