The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book The Art of Aerial Warfare: Instrument of War, Political Dimensions, Military Effects of Strategic Attack, Douhet's Argument, Objectives of Attack, Realities of War, Unintended Asymmetric Consequences by Progressive Management
Cover of the book Central Valley Project: Bureau of Reclamation Reports on San Luis Unit, Auburn Dam, Corps of Engineers, Delta Division, Friant Division, Sacramento River Division, Shasta Division, Trinity Division by Progressive Management
Cover of the book U.S. Strategic Communications Against Islamic Fundamentalists: Terrorism, Radicalization, Hard versus Soft Power, Cold War, Vietnam, Iraq, Jihadi Root Causes, Islamic State, ISIS, al-Qaeda, PSYOPS by Progressive Management
Cover of the book 21st Century Peacekeeping and Stability Operations Institute (PKSOI) Papers - The New Balance: Limited Armed Stabilization and the Future of U.S. Landpower, Land Force Optimization by Progressive Management
Cover of the book Linking Legacies: Connecting the Cold War Nuclear Weapons Production Processes To Their Environmental Consequences - Nuclear and Radioactive Waste, Environmental Contamination by Progressive Management
Cover of the book A History of Suction-Type Laminar-Flow Control with Emphasis on Flight Research: From the 1930s to the X-21 and the Boeing 757, Swept Wings, Noise, Insect Contamination, Ice Particles, Supersonic by Progressive Management
Cover of the book U.S. Marine Corps Civic Action Effort in Vietnam, March 1965: March 1966 - Fascinating Historic Document About Civilian Aid and Support Programs Early in the Vietnam War, III Marine Amphibious Force by Progressive Management
Cover of the book The Northern Cheyenne Exodus: A Reappraisal of the Army's Response - Why it Took the Army Seven Months and One Thousand Miles to Capture Fleeing Indians Under Chiefs Dull Knife and Little Wolf by Progressive Management
Cover of the book Apollo and America's Moon Landing Program - Project Apollo: The Tough Decisions (Seamans Report), and Managing the Moon Program: Lessons Learned From Project Apollo (Oral History Workshop) by Progressive Management
Cover of the book The Role of Rhetorical Theory in Military Intelligence Analysis: A Soldier's Guide To Rhetorical Theory - Panopticon, Discourse Hierarchy, Clausewitz, Foucault, Discontinuity Fever, Process by Progressive Management
Cover of the book Reducing the Potential for Heat Stroke to Children in Parked Motor Vehicles: Evaluation of Reminder Technology by Progressive Management
Cover of the book Libya: A Contemporary Conflict in a Failing State - From Italian Colonial Rule to Gaddafi's Coup, Emergence of Islamic State, ISIL, ISIS, Jamahiriya, Islamist Forces, Regional Militia, Arab Spring by Progressive Management
Cover of the book 2012 Biomass Multi-Year Program Plan: Biofuels, Bioproducts, and Biopower - Conversion Technologies, Feedstock Supply, Bio-Oil Pathways, Bioenergy Supply Chain by Progressive Management
Cover of the book 2013 Nuclear Weapons Stockpile Stewardship and Management Plan (for Fiscal Year 2014) - Nuclear Test Readiness, Warheads, Nuclear Security, Workforce, Engineering by Progressive Management
Cover of the book Radiological Dispersal Device (RDD) Dirty Bomb Medical Preparedness and Response: Guidance for First Responders and Health Care Workers - Radioactive Illnesses, Radiation Injuries, Decontamination by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy