The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book 21st Century FEMA Study Course: Introduction to Residential Coastal Construction (IS-386) - Beach Nourishment and Replenishment, Flood and Wind, Codes and Siting, Wildfires, Tsunami and Hurricane by Progressive Management
Cover of the book Globalness: Toward a Space Power Theory - Military Spaceflight, Strategic Theory, Weaponization, ASAT Anti-Satellite, GPS, Prompt Global Strike, Global Connectivity, Weapons Delivery by Progressive Management
Cover of the book U.S. Fire Administration Technical Report Series Special Report: Fires Involving Medical Oxygen Equipment by Progressive Management
Cover of the book History of the United States Strategic Command (USSTRATCOM) - Nuclear Weapons, Cold War Strategy, Service Rivalries, Arms Control by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Opposing Force OPFOR Worldwide Equipment Guide (WEG) Part 8 - Ground Systems - Logistics, Obscurants and Flame, Improvised Systems, Upgrades, Countermeasures by Progressive Management
Cover of the book The Rise of Iwar: Identity, Information, and the Individualization of Modern Warfare - Terrorism, Iraq, Afghanistan, DNA, Biometrics, Forensics, Palantir, Facial Recognition, DHS, FBI, USACIL, CODIS by Progressive Management
Cover of the book Case Studies in National Security Transformation: Littoral Combat Ship, FBI Counterterrorism, Counterinsurgency Support in Afghanistan, CEC Naval Anti-air Warfare, NMCI, Relief Hurricane Katrina by Progressive Management
Cover of the book NASA's First A: Aeronautics from 1958 to 2008 - From NACA to the Space Age, Dryden, Langley, Ames, X-Planes, Faget, Hypersonics, Lifting Bodies, V/STOL, Rutan, NASP, SST, Composites by Progressive Management
Cover of the book Self-Determination and Change in the Middle East and North Africa: Policy Speech by President Barack Obama, May 2011 - Islam, Israel and the 1967 Borders, Palestine, Libya, Egypt, Tunisia, Iraq, Iran by Progressive Management
Cover of the book 2012 U.S. Intelligence Community Worldwide Threat Assessment: Iran, Nuclear Weapons, Terrorism, al-Qaida, Jihad, Homegrown Terror, WMD, North Korea, Cyber Threat, Taliban, Afghanistan, Arab Spring by Progressive Management
Cover of the book National Security Space Strategy, Unclassified Summary, January 2011, plus Toward a Theory of Spacepower: Selected Essays by Progressive Management
Cover of the book Repressive States and Insurgencies: Implications for Future Campaigns - Counterinsurgency (COIN) Theories, Werewolf Movement, Werwolf Program, Nazi Waffen SS, Resistance in Soviet Union, Iraq War by Progressive Management
Cover of the book Marines in the Korean War Commemorative Series: Over the Seawall - U.S. Marines at Inchon, Douglas MacArthur, President Truman, 1st Marine Division, Wolmi-Do by Progressive Management
Cover of the book Human Missions to Mars: Comprehensive Collection of NASA Plans, Proposals, Current Thinking and Ongoing Research on Manned Mars Exploration, Robotic Precursors, Science Goals, Design Reference Mission by Progressive Management
Cover of the book The American Civil War (War Between the States): The Confederate Defense of Charleston, South Carolina - Naval Gunnery, Fort Sumter Union Defense, Du Pont's Attack, Amphibious, Submarine, Torpedo War by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy