The answer is authorized to use an organization’s system. In addition, if an authorized user tells another person his secret code, the unauthorized user can masquerade as the authorized user with significantly less likelihood of detection. People who have some motive to attack an organization and are not authorized to use the system of the organization are called outsiders and can pose a serious threat to an organization.