The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book The Russian Military and the Georgia War: Lessons and Implications - Ukraine and Crimea, NATO and EU, Putin and Obama, S-300 Missiles, Yushchenko, Yanukovich, Abkhazia, South Ossetia by Progressive Management
Cover of the book 2012 National Plan to Address Alzheimer's Disease (AD): Research, Education, Public-Private Partnerships, Prevent and Effectively Treat Alzheimer's Disease (Dementia) by 2025 by Progressive Management
Cover of the book History of the U.S. Army 7th Armored Division in World War II: From the Beaches to the Baltic and Roll out the Barrel, Drive through France, Chartres, Reims, Verdun, Seine, Battle Against the Nazi SS by Progressive Management
Cover of the book The 6555th Missile and Space Launches Through 1970, Post-War Legacy, Matador, Bomarc, Snark, Navaho, Thor, Atlas and Minuteman Ballistic Missile, Thor, Titan II and Gemini Program by Progressive Management
Cover of the book The Moment of Truth: The Final Report of the National Commission on Fiscal Responsibility and Reform, with Additional Member Comments - Federal Deficit, Social Security, Medicare, Entitlements by Progressive Management
Cover of the book Hybrid Warfare: Israel-Hezbollah War, World War II Eastern Front, American Experience in Vietnam, Operation Iraqi Freedom, Operational Approaches to Hybrid Warfare by Progressive Management
Cover of the book Boko Haram's Strategy Deconstructed: A Case Study Comparison Between Boko Haram and the Algerian National Liberation Front - Salafist Islamic Insurgency Strategy in Nigeria and West Africa by Progressive Management
Cover of the book The U.S. Marine Corps Mountain Warfare Training Center 1951-2001: Sierra Nevada Range, Cold Weather, Pickel Meadow, Hold Back the Night Movie, John Payne, Chuck Conners, NATO's Northern Flank by Progressive Management
Cover of the book The Swarm, the Cloud, and the Importance of Getting There First: What's at Stake in the Remote Aviation Culture Debate, Remotely Piloted Aircraft (RPA), Air-Mindedness, Manned-Remote Fusion by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Mycosis Fungoides and the Sezary Syndrome, Cutaneous T-cell Lymphoma. - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Changing Dynamics of the U.S.-China-Latin America Relationship: China's Economic Interest in Latin America, Military Cooperation, U.S. Trade with Mexico, American Foreign Policy Issues by Progressive Management
Cover of the book The Roots and Evolution of the Royal Australian Navy (RAN) - Korean War, Vietnam War, Iraq and Afghanistan, 9/11, China, Southeast Asia, Sea Power, ANZUS, ANZAM, SEATO by Progressive Management
Cover of the book The U.S. Army Campaigns of the War of 1812: The Chesapeake Campaign 1813-1814 - George Cockburn, British Burning of Havre de Grace, Craney Island, Battle of Bladensburg, British Raids by Progressive Management
Cover of the book The Human Factor: Biomedicine in the Manned Space Program to 1980 - Unique Insights into Biological and Life Science Research from Mercury, Gemini and Apollo through Skylab (NASA SP-4213) by Progressive Management
Cover of the book A Complex and Volatile Environment: The Doctrinal Evolution from Full Spectrum Operations to Unified Land Operations (ULO) - Warfighting Functions Including ISR, Battlespace, Operational Art, FSO by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy