An organization wants to identify potential insider threats and detect any suspicious behavior by its employees. Which of the following measures can help accomplish that?
A. Access control lists
B. Regular security audits
C. Network intrusion detection system
D. User activity monitoring