Analysis of a database insider threat model