The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book 21st Century U.S. Military Manuals: Instrument Flight for Army Aviators - Field Manual 3-04.240 (FM 1-240) Part 2 - Techniques for Instrument Flying and Air Navigation, Weather, Emergency Operations by Progressive Management
Cover of the book 2018 Cybersecurity Reports: Cybercrime and the Darknet, and Multiyear Plan for Energy Sector Cybersecurity - Protecting Electricity Delivery, Energy Reliability, and Power Utilities from Cyber Attack by Progressive Management
Cover of the book Tactical Nuclear Weapons and NATO - From Nuclear Artillery to Ballistic Missiles, TNWs and NSNWs, Nuclear Modernization, Deterrence, Operation Snowcat, Nuclear Zero, TLE (Treaty-limited Equipment) by Progressive Management
Cover of the book Army Unmanned Aircraft System Operations (FMI 3-04.155) - Improved-Gnat (I-Gnat) (RQ-1L), Hunter (RQ-5/MQ-5), Shadow (RQ-7), Raven (RQ-11) - Joint Operations, Targeting, Reconnaissance by Progressive Management
Cover of the book Marines in the Korean War Commemorative Series: Counteroffensive - U.S. Marines from Pohang to No Name Line - Matthew Ridgway, Truman Fires MacArthur, Medical Helicopter Evacuation by Progressive Management
Cover of the book 21st Century Geothermal Energy: Opportunities for Near-Term Geothermal Development on Public Lands in the Western United States by Progressive Management
Cover of the book U.S. Government Counterinsurgency Guide: Theory and Principles, Components of COIN Strategy, NGOs, Country Teams, Private Sector, USAID, Afghanistan by Progressive Management
Cover of the book 21st Century FEMA Study Course: An Introduction to Emergency Management Exercises (IS-120.A) - Managing, Designing, Conducting, Evaluating by Progressive Management
Cover of the book Tailored Deterrence: Influencing States and Groups of Concern - Case Studies of Russia, China in the Taiwan Strait, Nuclear-armed Iran, North Korea, Triad, Hussein and Gulf War Lessons, Zero Nukes by Progressive Management
Cover of the book United States Army Command and General Staff Officers Course Preparatory Curriculum Evaluation: Study of CGSOC Effectiveness Reveals Failure to Meet College Standards by Progressive Management
Cover of the book Foundations for Innovation: Strategic R&D Opportunities for 21st Century Cyber-Physical Systems - Connecting Computer and Information Systems With the Physical World, Robots, Autonomous Vehicles by Progressive Management
Cover of the book The Necessity for the Military Assistance Command: Vietnam Studies and Observations Group - MACVSOG Psychological Warfare, Maritime Interdiction, Recon Patrols, and Personnel Recovery Missions by Progressive Management
Cover of the book 21st Century Peacekeeping and Stability Operations Institute (PKSOI) Papers - Democratic Governance and The Rule of Law: Lessons From Colombia by Progressive Management
Cover of the book 2010 Planning Guidance for Response to a Nuclear Detonation: Federal Guidance for a Nuclear Bomb Attack on an American City, Effects, Fallout, Shelter, Medical Care, Decontamination by Progressive Management
Cover of the book Encyclopedia of NASA Lessons Learned (Part 2): Thousands of Aerospace Technology Engineering Reports, Problems, Accidents, Mishaps, Ideas and Solutions - Space Shuttle, Spacecraft, Rockets, Aircraft by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy