Abuse or taking advantage of valid user accounts and the permissions associated with those accounts aims to compromise:
a) System Integrity
b) Network Bandwidth
c) Data Confidentiality
d) Hardware Performance