The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book Soldiers of Misfortune? Blackwater USA, Private Military Security Contractors (PMSCs), Iraq War, Afghanistan War, Counterinsurgency (COIN) Campaigns, DynCorp, Zapata, Kroll by Progressive Management
Cover of the book U.S. Army Commander's Handbook for Unit Leader Development: Translating Leader Feedback, Prioritizing Leader Development Activities, Integrating Development into Day-to-Day Activities by Progressive Management
Cover of the book The United States Strategic Bombing Survey: The Effects of Atomic Bombs on Hiroshima and Nagasaki, June 30, 1946 - Casualties, Radiation Disease, Japanese Decision to Surrender by Progressive Management
Cover of the book International Atomic Energy Agency's Decision to Find Iran in Non-Compliance, 2002-2006 (IAEA) - Nuclear Bargaining Leads to Referral to the UN Security Council after New Bomb Suspicions Emerge by Progressive Management
Cover of the book 2016 Nuclear Matters Handbook: New Revised Edition, Authoritative Guide to American Atomic Weapons, History, Testing, Safety, Security, Delivery Systems, Physics and Bomb Designs, Terror Threats by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) Marine Corps Operations MCDP 1-0 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Eisenhower: The Suez Crisis - An Appraisal of Presidential Leadership, The Aswan Dam Problem, Diplomatic Marathon, Outbreak of War, Alliance with Britain and France in Peril, Final Resolution by Progressive Management
Cover of the book Space Shuttle Program History: Lessons Learned From Space Shuttle External Tank Development - A Technical History of the External Tank by Progressive Management
Cover of the book 2011 Complete Guide to Libya: Muammar al Qadhafi (Colonel Gadhafi, Qaddafi, Gaddafi), Government, Politics, Military, Human Rights, History, Economy, Uprising - Authoritative Coverage by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: The United States Army Functional Concept for Mission Command 2016-2028 - TRADOC 525-3-3 - Intertheater and Intratheater Maneuver (Professional Format Series) by Progressive Management
Cover of the book Qatar in Perspective: Geography, History, Economy, Security, Doha (Ad Dawhah), Ar Rayyan, Al Khawr, Umm Sa'id (Mesaieed), Dukhan, Bani Utub, Wahhabis, Al Than, Ottoman, Saudi, British Intrigues by Progressive Management
Cover of the book Killing a Peacock: Case Study of the Targeted Killing of Admiral Isoroku Yamamoto - World War II Operation Vengeance Against Japanese Pearl Harbor Attack Leader with P-38 Lightnings from Guadalcanal by Progressive Management
Cover of the book What's in a Name: A Comparative Analysis of the United States' Real ID Act and the United Kingdom's National Identity Scheme - Combating Terrorism, Identity Theft, Illegal Work and Benefit Fraud by Progressive Management
Cover of the book Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program by Progressive Management
Cover of the book Commanders' Responsibilities in the Operations Process during the 1864 Red River Expedition: Defeat of Union General Nathaniel Banks Between Louisiana and Little Rock, Arkansas in American Civil War by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy