The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book Tactical Nuclear Weapons and NATO - U.S. Nuclear Weapons Development and Modernization Controversy, U.S. - Russian Reset, Non-Strategic Nuclear Weapons (NSNW), Arms Control Options, START by Progressive Management
Cover of the book Operationalizing Intelligence Dominance: Consistent with Rule-of-Law Principles, Global Security Environment, Tasking and Coordination Groups, Counterintelligence, Human Intelligence, IRA, CONOPS by Progressive Management
Cover of the book The Role of Autonomy in DOD Systems - Unmanned Aerial Vehicles (UAV), Robotics, Teleoperation, Haptics, Centibot, Swarmanoid, LANdroid, Remote Presence, UxV, DARPA Research, Space and Ground Systems by Progressive Management
Cover of the book North Korea 2025: Alternate Futures and Policy Challenges - Crucial Role of China in Controlling Expanded DPRK Nuclear Weapons Capabilities, Potential of Korean Unification, Stability of the Regime by Progressive Management
Cover of the book U.S. Marines History: Marine Advisors with the Vietnamese Provincial Reconnaissance Units, 1966-1970 - Phoenix Program, Counterinsurgency, PRU, Advisors Tell Their Stories by Progressive Management
Cover of the book Navy Shipboard Lasers for Surface, Air, and Missile Defense: Deployment of the First Solid-State Laser Directed Energy Weapon, SSL, FEL, TLS, MLD, Terminal Defense Against China's ASBM by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Environmental Considerations in Military Operations Field Manual - FM 3-100.4 (Value-Added Professional Format Series) by Progressive Management
Cover of the book 21st Century Ultimate Guide to Wind Energy: Wind Power Systems, Turbines, Small Wind Consumer Guide, Incentives for Development, Low and Large Wind, Plans and Programs, Siting and Other Issues by Progressive Management
Cover of the book Commanding an Air Force Squadron in the 21st Century: A Practical Guide of Tips and Techniques for Today's Squadron Commander - Leadership, Unit Cohesion, Morale, Inspections, Art of Command, Families by Progressive Management
Cover of the book Robotic Mars Exploration Encyclopedia: Science Goals, Mars Sample Return Mission Planning and Technology, Astrobiology, the Search for Life on Mars, Orbiters, Landers, Geology, Habitable Environments by Progressive Management
Cover of the book Project Mercury: A Chronology - A History of America's First Manned Spacecraft for the Shepard, Grissom, Glenn, Carpenter, Schirra, Cooper Flights (NASA SP-4001) by Progressive Management
Cover of the book Coastal Fortifications and National Military Policy, 1815-1835: History of Fortifications from Colonial Period to Third System, Military Policy After War of 1812, Monroe and Madison Guidance Report by Progressive Management
Cover of the book Foundations for Innovation: Strategic R&D Opportunities for 21st Century Cyber-Physical Systems - Connecting Computer and Information Systems With the Physical World, Robots, Autonomous Vehicles by Progressive Management
Cover of the book Earthquake Risks from Enhanced Geothermal Systems (EGS): Induced Seismicity from Geothermal Energy, Addressing Public Concerns, Expert Panel Protocols by Progressive Management
Cover of the book Egypt in Perspective: Orientation Guide and Cultural Orientation: Geography, History, Economy, Security, Religion, Cairo, Suez, Nasser, Sadat, Mubarak, Arab Spring, Islam, Coptic Christian, Nubians by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy