An attack initiated by an entity that is authorized to access system resources but uses them in a way not approved by those who granted the authorization is known as a(n):A. active attack.B. outside attack.C. inside attack.D. passive attack.