The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book A Leader's Handbook to Unconventional Warfare: Guerrillas, Phases of an Insurgency, UW in Support of Limited War, U.S. UW Efforts from 1951- 2003 including Iraq by Progressive Management
Cover of the book Civil War Logistics: Effects of Logistics on Pea Ridge Campaign - Overall American Civil War Sustainment, Federal and Confederate Leaders, Battle in the Southwest Without Railroads or Navigable Water by Progressive Management
Cover of the book Saddam Hussein's Nuclear Vision: An Atomic Shield and Sword for Conquest - Iraq's Enemies, Iran, Israel, Osirak Airstrike, Duelfer Report, A.Q. Khan, WMD by Progressive Management
Cover of the book Military Cyber Attacks and America's Vulnerable Nuclear Weapons and Defenses: DoD Task Force Report on Resilient Military Systems and the Advanced Cyber Threat by Progressive Management
Cover of the book Conflict Management and "Whole of Government": Useful Tools for U.S. National Security Strategy? Loose Nukes, WMD, Fukushima, Rinderpest, Embassy Security, Afghanistan, Iraq, Sudan by Progressive Management
Cover of the book Knockout Blow? The Army Air Force's Operations Against Ploesti and Balikpapan: World War II Oil Refinery Bombings in Europe and the Pacific, Tactical Answers, Strategic Questions by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Parathyroid Cancer - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Nuclear Explosive Safety: Weapon Surety Program, Evaluation Processes Manual, DOE Interface with Department of Defense, Safety Manual, Self-Study Program by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: 2012 Training Units and Developing Leaders Army Doctrine Reference Publication (ADRP) 7-0 (Professional Format Series) by Progressive Management
Cover of the book Preparing for an Era of Persistent Conflict: Low Intensity Conflict, Piracy, Somalia, Terrorism, Case Study of U.S. Iraq Invasion Decision, Clausewitz's Trinity, Unified Command Plan History by Progressive Management
Cover of the book National Emergency Medical Services Education Standards: Advanced Emergency Medical Technician Instructional Guidelines by Progressive Management
Cover of the book Encyclopedia of Strategic Nuclear Forces - Missiles, Bombers, Submarines, Triad, Warheads, Modernization Plans, ICBM, SLBM, START Treaty, Long-Range Standoff (LRSO), Global Strike, Verification by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Food Sanitation for the Supervisor Field Manual - FM 8-34 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Gradual Failure: The Air War Over North Vietnam 1965 - 1966 - War in Southeast Asia and Indochina, Flaming Dart, Rolling Thunder, Pause and Escalation, SAM Threat, Bombing Halt by Progressive Management
Cover of the book Clarifying Relationships Between Objectives, Effects, and End States With Illustrations and Lessons from the Vietnam War: Maxwell Taylor, McNamara, von Clausewitz by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy