The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book Complete Guide to Women in Military Combat: Implementation of the Decision to Open All Ground Combat Units to Women, Cultural Issues, Congressional Action, Army Plans and Actions, Impact on Marines by Progressive Management
Cover of the book Apollo and America's Moon Landing Program - Aiming At Targets - The Autobiography Of Robert C. Seamans, Jr. (NASA SP-4106) Incisive Commentary on Apollo, the Apollo 1 Fire, Space Program Management by Progressive Management
Cover of the book U.S. Marines in Battle: An-Najaf August 2004 - Iraq War, Muqtada al-Sadr, Mahdi Militia, Task Force Dragon by Progressive Management
Cover of the book Ivory Coast (Cote d'Ivoire): Federal Research Study with Comprehensive Information, History, and Analysis - Abidjan, Ivorian Military, Government and Politics, Economy, Population, Social Issues by Progressive Management
Cover of the book 2012 Drug and Chemical Control Report by the State Department (Volume I of the International Narcotics Control Strategy Report - INCSR) by Progressive Management
Cover of the book Democratic Republic of the Congo (DRC) in Perspective - Orientation Guide: Geography, History, Cities, Economy, Society, Security, Military, Religion, Traditions, Mobutu Era, Congo Wars, Hazards by Progressive Management
Cover of the book Desert Storm: War, Time, and Substitution Revisited - Course of the Air Campaign, Strike Results, Key Production Targets, Deployed Missile Forces, Lines of Communications, Allied Air Management by Progressive Management
Cover of the book The United States and China in Power Transition: Chinese History, Uyghurs, Sun Yat-Sen, Taiwan, Spratly and Senkaku Islands, Tibet, Dalai Lama, Xinjiang, Han Chinese by Progressive Management
Cover of the book Nanoscience and Nanotechnology: Signature Initiatives on Knowledge Infrastructure, Sensors, Nanoelectronics, Nanomanufacturing, Solar Energy Collection, Federal Research Strategy by Progressive Management
Cover of the book 21st Century Addison's Disease Sourcebook: Clinical Data for Patients, Families, and Physicians, including Adrenal Insufficiency, Adrenocortical Hypofunction, Hypocortisolism, and Related Conditions by Progressive Management
Cover of the book Security Implications of Italian Nationalism: Northern League, Padania, Five Star, Euroscepticism, European Union, NATO, Russia, Mafia Presence and Corruption, Post-World War II History, Forza Italia by Progressive Management
Cover of the book From Runway to Orbit: Reflections of a NASA Engineer - Revelations about the Space Shuttle, Challenger Accident, X-15, Lifting Body Program, NASP, Hypersonics and the X-33 (NASA SP 2004-4109) by Progressive Management
Cover of the book NASA Space Shuttle Program Tacit Knowledge Capture Project: Oral Histories from Twenty Program Officials and Managers, Challenger and Columbia Accident Insights and Lessons Learned by Progressive Management
Cover of the book China's Economic Development Plan in Xinjiang and How it Affects Ethnic Instability: Economic Development in the Xuar, Uyghurs, Silk Road, Central Asia Resources, Han Migrants, Destabilizing Factors by Progressive Management
Cover of the book Al-Qaida After Ten Years of War: A Global Perspective of Successes, Failures, and Prospects - Iraq and Afghanistan, Pakistan, Arab Spring, Tuaregs, bin Laden, Egypt, al-Shabaab, al-Qaeda by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy