The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book FAA National Aviation Research Plan, Portfolio of Goals, Destination 2025, Flight Plan Program: National Airspace System, NextGen, Air Traffic, Human Protection, Crash Safety, Aviation Weather by Progressive Management
Cover of the book Essential Guide to Lt. General Herbert (H.R.) McMaster, National Security Advisor: Thinking and War Scholarship, Moral and Ethical Soldiers, War on Terrorism, Paper on Future Wars and Technology by Progressive Management
Cover of the book The Special Operations Forces (SOF) Nutrition Guide - Warrior Athlete, Fueling the Human Weapon, Nutrient Timing, Healthy Snacking, Keeping Lean, Bulking Up, Combat Rations, Nutrition for Combat by Progressive Management
Cover of the book Recommendations for Enhancing Reactor Safety in the 21st Century: The Near-Term Task Force Review of Insights From The Fukushima Dai-Ichi Accident (Nuclear Power Plant Disaster) by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Pancreatic Cancer, Pancreatic Neoplasms, Cancer of the Pancreas - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Encyclopedia of NASA Lessons Learned (Part 2): Thousands of Aerospace Technology Engineering Reports, Problems, Accidents, Mishaps, Ideas and Solutions - Space Shuttle, Spacecraft, Rockets, Aircraft by Progressive Management
Cover of the book Against All Odds: Relations Between NATO and the MENA Region - Operation Unified Protector, Mediterranean Dialogue, Libya, Syria, Palestine, Lebanon, Istanbul Cooperation Initiative by Progressive Management
Cover of the book Poland in Perspective: Orientation Guide and Polish Cultural Orientation: Geography, History, Economy, Security, Gomulka, Gierek, Collapse of Communism, Warsaw, Lodz, Krakow, Gdansk, Lublin, Oder by Progressive Management
Cover of the book Air Force Doctrine Document 3-24, Irregular Warfare: Countering Insurgency and Terrorism, Military Deception, Counterpropaganda, Understanding Insurgencies, Revolutionary Movements, Coup d'Etat by Progressive Management
Cover of the book How China Wins: A Case Study of the 1979 Sino-Vietnamese War - Analysis of the Parallels and Differences Between the Chinese Communist Party Under Deng Xiaoping That Waged War and Today's CCP by Progressive Management
Cover of the book Somalia in Perspective: Orientation Guide and Somali Cultural Orientation: Geography, History, Economy, Security, Mogadishu, Berbera, Merca, The Guban, Karkaar Mountains, Evil Eye, Khat, Piracy by Progressive Management
Cover of the book Army Unmanned Aircraft System Operations (FMI 3-04.155) - Improved-Gnat (I-Gnat) (RQ-1L), Hunter (RQ-5/MQ-5), Shadow (RQ-7), Raven (RQ-11) - Joint Operations, Targeting, Reconnaissance by Progressive Management
Cover of the book What's in a Name: A Comparative Analysis of the United States' Real ID Act and the United Kingdom's National Identity Scheme - Combating Terrorism, Identity Theft, Illegal Work and Benefit Fraud by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Opposing Force OPFOR Worldwide Equipment Guide (WEG) Part 5 - Ground Systems - Antitank and Anti-armor including Russian, Chinese, U.S., North Korean by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Use of Army National Guard Aircraft - Transportation and Use Policy, Authorized Travel Categories, Duty Status, Air Categories, Aeromedical by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy