The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book Space Shuttle NASA Mission Reports: 1990 Missions, STS-32, STS-36, STS-31, STS-41, STS-38, STS-35 by Progressive Management
Cover of the book The Rules of Defeat: The Impact of Aerial Rules of Engagement (ROE) on USAF Operations in North Vietnam, 1965-1968, Effect on Commanders and Aircrews, Rolling Thunder Bombing Mission Effectiveness by Progressive Management
Cover of the book A Theater Approach to Low Intensity Conflict: CLIC Papers - Middle East, Southern Africa, Horn of Africa, Central Asia, Persian Gulf, Pacific Rim, Central America, Caribbean, Terrorism, Drugs by Progressive Management
Cover of the book Essential Guide to Lt. General Herbert (H.R.) McMaster, National Security Advisor: Thinking and War Scholarship, Moral and Ethical Soldiers, War on Terrorism, Paper on Future Wars and Technology by Progressive Management
Cover of the book Naval Aviation Vision: Sea Control, Maritime Security, Power Projection, Deterrence, Humanitarian Assistance, Century of Excellence, Future, Transformation Roadmaps, Forcenet by Progressive Management
Cover of the book 20th Century Spy in the Sky Satellites: Secrets of the National Reconnaissance Office (NRO) Volume 8 - History Volumes: Management of the Program 1960-1965, Corona and Predecessor Programs by Progressive Management
Cover of the book Resurgent Russia in 2030: Challenge for the USAF - Alternate Russian Futures, Political, Economic, and Military Background, Rising Power, Friend or Foe, Implications for the American Military by Progressive Management
Cover of the book 21st Century Space Elevators: Advanced Earth-Space Infrastructure: NASA Report on Technology, Plans, Concepts, Materials, Environmental and Safety Issues by Progressive Management
Cover of the book Military Bibliographies: History, Terrorism, Military Classics, Ethics, Cyberspace, Conflict Termination, Women in the Military, China Relations, Officership, Civil-Military, All-Volunteer Force by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Intelligence and Electronic Warfare Operations (FM 34-1) Combat Operations, Information Warfare (Value-Added Professional Format Series) by Progressive Management
Cover of the book Hitting a Bullet with a Bullet: A History of Ballistic Missile Defense (BMD) - Nike, Sprint and Spartan, Strategic Defense Initiative (SDI) Star Wars, Patriot versus Scud Gulf War, THAAD, Lasers by Progressive Management
Cover of the book Leadership and Parochialism: An Enduring Reality? Defense Reorganization, Bias in Praxis, Just Cause and Persian Gulf War, Colin Powell, Schwarzkopf, Jointness Attitudes by Progressive Management
Cover of the book Roadside Bombs and Improvised Explosive Devices (IEDs) - America's Effort to Target and Defeat Homemade Explosives in Afghanistan and Iraq - Electronics, Surveillance, Dogs, and More by Progressive Management
Cover of the book Trolling New Media: Violent Extremist Groups Recruiting Through Social Media - Propaganda, Websites, Blogs, Mobile Phones, Online Gaming, al-Qaeda, ISIS, Muslim Terrorism, Counterterrorism by Progressive Management
Cover of the book The Lessons of History: The Chinese People's Liberation Army (PLA) at 75 - Tiananmen Square, Cultural Revolution, Air Force, Navy, Lessons from Korean War, Vietnam Campaign by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy