1. Insider Attacks: Theft 1Running Head: INSIDER ATTACKS: THEFT Insider Attacks: Theft of Intellectual and Proprietary Data Lindsey LandolfiTowson University Network Security…