The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book Bio-Inspired Innovation and National Security: Biological Warfare, Biomolecular Engineering, DARPA, Abiotic Sensing, Biosensing and Bioelectronics, Bioenergy, Neurobiotics, Human Applications by Progressive Management
Cover of the book 2011 Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry - DSS Protection of National Security Classified Information from Espionage, Sabotage, and Terrorism by Progressive Management
Cover of the book Lessons from the Normandy Invasion of World War II: Staff Development, Deception Operations, and Force Projection - Complexity of Planning, Sluggish Progress, Signals Intelligence and SHAEF Staff by Progressive Management
Cover of the book Skylab, America's First Space Station Program: Astronaut Oral Histories, including Bean, Carr, Garriott, Gibson, Kerwin, Lousma, Weitz by Progressive Management
Cover of the book Thomas Holcomb and the Advent of the Marine Corps Defense Battalion: 1936-1941 - Albert Thayer Mahan, Marine Corps Base Defense Mission, The ORANGE Plan and the Japanese Threat by Progressive Management
Cover of the book Counterinsurgency in Somalia: Lessons Learned from the African Union Mission in Somalia, 2007-2013 - Insurgents, Harakat al-Shabaab, Somali Piracy, Evolution of AMISOM, U.S. Role, Lessons Learned by Progressive Management
Cover of the book Apollo's Warriors: U.S. Air Force Special Operations during the Cold War - Secret Psywar Weapons, Indochina War, Air Commandos, Covert War Missions by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Stages to Saturn - A Technological History of the Apollo/Saturn Launch Vehicles (NASA SP-4206) - Official Saturn V Development History by Progressive Management
Cover of the book Europe's Dependence on Russian Natural Gas: Perspectives and Recommendations for a Long-term Strategy, Putin, Politics, and Gazprom, Ukraine, Diversification Options by Progressive Management
Cover of the book 21st Century VA Independent Study Course: Medical Care of Persons with Spinal Cord Injury, Autonomic Nervous System, Symptoms, Treatment, Related Diseases, Motor Neuron Injury, Autonomic Dysreflexia by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Multi-Service Tactics, Techniques, and Procedures for Conducting Peace Operations - FM 3-07.31 (Value-Added Professional Format Series) by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Opposing Force Operations Field Manual - FM 7-100.1 (Value-Added Professional Format Series) by Progressive Management
Cover of the book History of the Office of the Secretary of Defense, Volume Two: The Test of War, 1950-1953 - Pentagon's Role in the Korean War, the Recall of MacArthur, Hydrogen Bomb, Truman, NATO by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) Religious Ministry in the U.S. Navy, Navy Warfare Publication (NWP) 1-05 by Progressive Management
Cover of the book 2011 U.S. Army Posture Statement: Summary of Army Roles, Missions, Accomplishments, Plans, and Programs - Basic Reference on the State of the Army by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy