Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System