1.Unauthorized usage/access can involve authorized user attempting unauthorized access or unauthorized user attempting access.
2.Solved by
+ Data classification
+ Strong Authentication
+ Information Rights Management
+ Encryption
+ Obfuscation,anonymization,tokenization and masking
+ Data Loss Prevention (DLP) system
+ TPM
+ Anti-Malware
+ Proper treatment or sanitization of data at end at life cycle.
+ Monitoring