Which of the following might be red flags that someone has become a malicious insider threat? Choose all that apply.
1) Unusual access to sensitive information
2) Frequent unauthorized access attempts
3) Changes in behavior or attitude
4) Sharing sensitive information with unauthorized individuals
5) Engaging in suspicious activities