detection-method-vocab ====================== **Audit** (1) The insider's activity was spotted during an internal or third-party auditing process **Technical Means** (2) The insider's activity was detected via analysis or anomalies in technical systems and software **Non-Technical Means** (3) The insider's activity was detected in a non-technical fashion (e.g., the insider had personal items purchased with a company credit card sent to the office by accident) **Security Software** (4) The insider's activity was detected by security software (e.g., the insider tried to download a document with trade secrets and an automatic alert detected the download) **System Failure** (5) The insider's activity resulted in a system going down within the organization, which led to the detection of the insider's activities