Evaluate

What are different kinds of insider threats to our US cyber security?What mitigation efforts can help address this concern?Does corruption and cyber infrastructure have anything in common? What are they and what can be done to help address this concern?