The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book 21st Century U.S. Military Manuals: Nuclear, Biological, and Chemical Aspects of Consequence Management - FM 3-11.21 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Russia and NATO Ballistic Missile Defense: The European Phased Adaptive Approach Experience, 2009-2017, Obama Plan and BMD History, Response of Poland, Czech Republic, and Russia by Progressive Management
Cover of the book NASA Space Technology Report: GPS Lessons Learned from the International Space Station (ISS), Space Shuttle and X-38, Software, INS Integration by Progressive Management
Cover of the book Ukraine Reports: The U.S. Military Commission to the Crimean War, 1855-1856 - History, Russia, European Armies by Progressive Management
Cover of the book NASA Space Technology Report: EVA Radio - Desert Research and Technology Studies DRATS 2011 Report, Analog Testing of Technologies for Human Space Exploration by Progressive Management
Cover of the book Breaking the Ice: Potential U.S. - Russian Maritime Conflict in the Arctic - Disputed Areas, Lomonosov Ridge, Bering Strait, Beaufort Sea, Northwest Passage, Hans Island, NATO Perspective, UNCLOS by Progressive Management
Cover of the book Effects of UAVs on Interstate Relationships: A Case Study of U.S. Relations With Pakistan and Yemen - UAS, Drones, al-Qaeda, AQAP, Saudi Arabia, Arab Spring, Anwar al-Awlaki, Collateral Damage by Progressive Management
Cover of the book Force and Accommodation in World Politics: Bargaining with Threats and Incentives, Carrots and Sticks, Case Studies of Quemoy Crisis, Berlin, Cuban Missile Crisis, Vietnam War, Kennan and Containment by Progressive Management
Cover of the book The Better Blitzkrieg: A Comparison of Tactical Airpower Use by Guderian and Patton, Luftwaffe, Panzer Campaign, Close Cooperation at the Meuse, German and Army Air Forces Airpower Doctrine by Progressive Management
Cover of the book The "People" in the PLA: Recruitment, Training, and Education in China's Military - Chinese Military Career Profiles, Conscripts, Officer Corps, Command Colleges by Progressive Management
Cover of the book Blending Science and Art: Cold War Lessons for Strategy Development in Postmodern War - Chaoplexic Warfare, Paradigms, Perceptions and Interpretation of Information (PPI), Rational Actor Model (RAM) by Progressive Management
Cover of the book With Marines in Operation Provide Comfort: Humanitarian Operations in Northern Iraq, 1991 - Kurds, Saddam Hussein, Incirlik Air Base, Camp Sommers, Zakho, Gallant Provider, Kurdish Relief Efforts by Progressive Management
Cover of the book Condensed Analysis of the Ninth Air Force in the European Theater of Operations of World War II: D-Day, Normandy, Ardennes, Battle of the Bulge, Middle Wallop, Biggin Hill, Second World War by Progressive Management
Cover of the book 21st Century FEMA Study Course: Applying ICS to Healthcare Organizations (IS-200.HCa) - Physicians, Department Managers, Unit Leaders, Charge Nurses, And Hospital Administrators by Progressive Management
Cover of the book Essential Guide to Sexual Assault and Rape: Campus and College Student Victimization, Not Alone: White House Task Force to Protect Students From Sexual Assault, Alcohol on Campus by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy