The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book Bombs Over Bosnia: The Role of Airpower in Bosnia-Herzegovina - NATO Operation Deny Flight, Serbs and the Death of Yugoslavia, Deterrent Use of Airpower, Deliberate Force, Dayton Peace Accord by Progressive Management
Cover of the book History of the Joint Chiefs of Staff: Volume II: The Joint Chiefs of Staff and National Policy 1945 -1947 - Palestine, Berlin Crisis, Carrier Cancellation, NATO, Soviet Atomic Bomb, H-Bomb by Progressive Management
Cover of the book U.S. Marines History: The 1st Marine Division and Its Regiments, 5th Marines, 7th Marines, 11th Marines, Guadalcanal, Lineage, Honors and Commanding Officers by Progressive Management
Cover of the book The Bureau of Reclamation: History Essays from the Centennial Symposium - Part 2: Central Valley Project, Glen Canyon Dam, Hydropolitics, One Hundred Years, Veterans, CCC, Colorado River, West Water by Progressive Management
Cover of the book A Five-Star Folly: An Investigation into the Cost Increases, Construction Delays, and Design Problems That Have Been a Disservice to the Effort to Memorialize Dwight D. Eisenhower by Progressive Management
Cover of the book Air Force Doctrine Document 4-0: Combat Support - Red Horse Units, Readying the Force, Preparing the Battlespace, Agile Combat Support (ACS), Functional Specialties, Contingency Contracting by Progressive Management
Cover of the book The Center of Gravity (COG) Systemically Understood - Clausewitz and Systems Thinking, Napoleon, Battles of Granicus, Issus, and Gaugamela, Jena-Auerstadt 1806, Vietnam War (Cambodia), Desert Storm by Progressive Management
Cover of the book The U.S. Air Force in Space 1945 to the Twenty-first Century: Recollections of General Schriever, Balancing Technology and Reliability, Cold War, Space Power, Persian Gulf War, Manned versus Unmanned by Progressive Management
Cover of the book A European Identity: Too Much to Hope For? Far-Right Populist Parties, British UKIP and German AfD Parties, Potential for Catastrophic European Union (EU) Failure and Issues for U.S. Security by Progressive Management
Cover of the book Encyclopedia of the Chindits, Orde Wingate, China, Burma Campaign, India (CBI), Myanmar Theater in World War II: Guerrillas, Light Infantry, Magic and Ultra, Slim, Commandos, Merrill's Marauders by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Esophageal Cancer (Cancer of the Esophagus) - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book 21st Century Military Warfighter Reference: Warfighter Nutrition Guide, Fueling the Human Weapon, High Performance Catalysts, Secrets to Keeping Lean, Supplements for an Edge, Foods to Eat or Avoid by Progressive Management
Cover of the book NIOSH Nanotechnology Safety: Safe Nanotechnology in the Workplace, Workers Exposed to Engineered Nanoparticles, Health and Safety Concerns Research by Progressive Management
Cover of the book The First United States Army Observers of Military Conflicts in Post Napoleonic Europe (1855-1871) - Delafield Commission to the Crimean War and Sheridan Expedition to the Franco-Prussian War by Progressive Management
Cover of the book Air Force Cyberspace Reports: Principles of War, Act and Actor Attribution, Legal Framework, Influence Operations and the Internet, Command and Control Model, Sea Power and Fleet Resources by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy