The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book The Agency and the Hill: CIA's Relationship with Congress, 1946-2004 - Central Intelligence Agency (CIA) Intelligence Papers by Progressive Management
Cover of the book U.S. Air Force Aerospace Mishap Reports: Accident Investigation Boards for A-10 Warthog Close Air Support Aircraft 2011 and 2010, C-17 Globemaster Transport Plane 2010, CV-22 Osprey 2010 by Progressive Management
Cover of the book North Korea in Perspective: Orientation Guide and North Korean Cultural Orientation: Geography, History, Economy, Security, Pyongyang, Goguryo, Silla Dynasty, Chosun, Kim Dynasty, Kim Jong Un, Yalu by Progressive Management
Cover of the book Weather Satellite Programs at Risk: Problems with America's Polar and Geostationary Environmental Satellites, JPSS and GOES, Possible Gaps in Critical Data for Weather Forecasting Models by Progressive Management
Cover of the book The Rise of Iwar: Identity, Information, and the Individualization of Modern Warfare - Terrorism, Iraq, Afghanistan, DNA, Biometrics, Forensics, Palantir, Facial Recognition, DHS, FBI, USACIL, CODIS by Progressive Management
Cover of the book General George C. Marshall: World War II Strategic Leader, Emergence of a Politician, Father of Air Force, Effective Staff Leadership, Communist Threat, Forgotten Master Strategist, Interview by Progressive Management
Cover of the book Pakistan in Perspective: Orientation Guide and Baluchi, Pashto, Punjabi, Sindhi, and Urdu Cultural Orientation: Balochistan, Karachi, Lahore, Islamabad, Rawalpindi, Saraikis, Kashmiri, Terrorism by Progressive Management
Cover of the book National Defense Intelligence College Paper: Interrogation - World War II, Vietnam, and Iraq; al Qaeda Torture, Waterboarding, Bush, Cheney, CIA by Progressive Management
Cover of the book History of the Joint Chiefs of Staff: The War in Vietnam 1960-1968, Part 3 - Rolling Thunder, TET Offensive, Domestic Dissent, Quest for Talks, Strengthening the RVNAF by Progressive Management
Cover of the book Space Shuttle NASA Mission Reports: 1991 Missions, STS-37, STS-39, STS-40, STS-43, STS-48, STS-44 by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Army Human Intelligence (HUMINT) Collector Operations FM 2-22.3 (FM 34-52) - Interrogation, Enemy Combatants, POWs, Detainees, Military Police by Progressive Management
Cover of the book Defense Is From Mars, State Is From Venus: Improving Communications and Promoting National Security - Covering Peacekeeping, Foreign Policy, and the Character Traits of Military Officers and Diplomats by Progressive Management
Cover of the book Maskirovka 2.0: Hybrid Threat, Hybrid Response - Putin and Russian Assaults on Georgia, Ukraine and Syria, Advancing Regional Hegemony with Proxy Forces, Outline of a Campaign to Combat Aggression by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Pituitary Tumors, Adenomas, Carcinomas - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Introduction to Defense Acquisition Management (Tenth Edition) - How DoD Does Business, Program Management, Policy, Resource Allocation Process, Weapon Systems by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy