The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book International Space Station (ISS) Systems Engineering Case Study: History and Development of the Station, Hardware and Software, Anomaly Resolution, Russian Participation by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Multiservice Tactics, Techniques, and Procedures for Biological Surveillance Field Manual - FM 3-11.86 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Operation Just Cause: The Planning and Execution of Joint Operations in Panama - Noriega, Media and Hostage Issues, Nunciatura, Impact of Goldwater-Nichols, Assessment by Progressive Management
Cover of the book Sri Lanka in Perspective: Orientation Guide and Tamil Cultural Orientation: Geography, History, Economy, Security, LTTE, Islamist Violence, Colombo/Sri Jayawardenepura Kotte, Negombo, Kandy, Moors by Progressive Management
Cover of the book Spyplanes and National Reconnaissance in the 20th Century: The Amazing Story of the U-2 Program, A-12 Oxcart, Francis Gary Powers Incident, Cuba Missile Crisis, Aquatone and Genetrix Projects by Progressive Management
Cover of the book Hezbollah: A Charitable Revolution - Militant Lebanese Shia Group, Party of God, Lebanese History, Funding Social Services, Musa al-Sadr, Syria, Hariri's Assassination, PLO and Israel, Civil Military by Progressive Management
Cover of the book FBI Hate Crime Data Collection Guidelines and Training Manual: Criteria and Definitions, Scenarios of Bias Motivation, Race, Religion, Ethnicity, Sexual Orientation, Disability, Gender by Progressive Management
Cover of the book 20th Century Guide to the Tuskegee Airmen, Air Force Integration, Blacks in the Army Air Forces in World War II, Racial Segregation and Discrimination, African-American Race Relations in the Air Force by Progressive Management
Cover of the book Command in Air War: Centralized versus Decentralized Control of Combat Airpower - Desert Storm, Enduring Freedom, Iraqi Freedom by Progressive Management
Cover of the book Air Force Doctrine Document 3-14.1: Counterspace Operations - Space Situation Awareness, Surveillance, Reconnaissance, Targeting, ISR, GPS, Space Order of Battle by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: National Guard Weapons of Mass Destruction Civil Support Team Management, CBRNE Enhanced Response Force Package Management by Progressive Management
Cover of the book The Revolutionary War (War of American Independence): Timeline of the American Revolution, Featuring the Content of Original Documents by George Washington, Continental Congress, Thomas Paine, Others by Progressive Management
Cover of the book Countering Transnational Organized Crime: How Special Operations Forces Build National Police Capacity in Latin America - TCOs in Bolivia, Colombia, Junglas, Honduras, Narcotics and Drug Trafficking by Progressive Management
Cover of the book 2013 China Military and Security Report: People's Liberation Army (PLA), Space, Cyber Attacks on American Military, Technology, People's Republic of China Force Modernization, Taiwan by Progressive Management
Cover of the book 2011 Complete Guide to Libya: Muammar al Qadhafi (Colonel Gadhafi, Qaddafi, Gaddafi), Government, Politics, Military, Human Rights, History, Economy, Uprising - Authoritative Coverage by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy