Which of the following statements best characterizes an insider threat?
A) An external hacker gaining unauthorized access through phishing
B) A system failure caused by software bugs
C) A trusted employee misusing their access to steal or compromise sensitive information
D) A technical malfunction resulting from outdated hardware