The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book National Defense Intelligence College Paper: Anticipating Surprise - Analysis for Strategic Warning - DEFCON Status, Deception, Surprise and Timing, Political and Military Factors by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: NASA Recommendations to Space-Faring Entities - How to Protect and Preserve the Historic and Scientific Value of U.S. Government Lunar Artifacts by Progressive Management
Cover of the book Inside the International Space Station (ISS): NASA Operations and Planning Astronaut Training Manual by Progressive Management
Cover of the book 21st Century Understanding Cancer Toolkit: Radiation Therapy and Treatment, Side Effect Management, External, Internal, IMRT, Brachytherapy - Information for Patients, Families, Caregivers by Progressive Management
Cover of the book Here to Help: Third Party Deterrence Against Insurgent Groups - State Centrism, Nuclear Prominence, and Congruent Relationships, Denial, Delegitimization, Case Study of Boko Haram, Nigeria and America by Progressive Management
Cover of the book Understanding and Accounting for National Will in Strategies that Use Military Force: Case Studies of Gulf War, Desert Storm, Operations in Somalia and Bosnia-Herzegovina, Operation Joint Endeavor by Progressive Management
Cover of the book History of the Office of the Secretary of Defense, Volume Five: The McNamara Ascendancy 1961-1965 - Berlin Wall, Bay of Pigs Fiasco, Cuban Missile Crisis, Vietnam, Nuclear Test Ban by Progressive Management
Cover of the book Skilled and Resolute: A History of the 12th Evacuation Hospital and the 212th MASH 1917-2006 - World War I and II, Vietnam, Persian Gulf War Desert Storm, Balkans, Iraq War, Iraqi Freedom, Final Days by Progressive Management
Cover of the book Essential Guide to Interrogation and Torture: CIA KUBARK Counterintelligence Interrogation Manual, Human Resource Exploitation Training Manual, Art and Science of Interrogation by Progressive Management
Cover of the book Vanguard: A History (NASA Historical Series SP-4202) - Comprehensive Official History of America's First Satellite Program at the Start of the Space Race by Progressive Management
Cover of the book 2016 Perspectives on Nuclear Deterrence: USSTRATCOM Strategic Command Symposium - Enduring Value of Nuclear Weapons, Force Numbers Matter, Strong 21st Century Deterrent Need, China, Iran, North Korea by Progressive Management
Cover of the book Intelligence Community Legal Reference Book: Laws of the Federal Government Guiding the Intel Community - CIA Act, USA PATRIOT Act, Detainee Treatment Act, War Crimes Act, Executive Orders by Progressive Management
Cover of the book Implications of Ideology in the Endurance of Competitive Authoritarian Regimes: Case Studies of Venezuela Under Hugo Chavez and Peru Under Fujimori, Left versus Right, Bolivarianismo and Chavismo by Progressive Management
Cover of the book Strategic Air Command SAC Missile Chronology 1939: 1988: Full History of SAC Missiles, System Maps, Cold War, Missile Defense, ICBM, IRBM, ALCM, Thor, Atlas, Titan, Snark, Minuteman, MX Peacekeeper by Progressive Management
Cover of the book Vanguard of Valor: Strykers in Afghanistan - 1st Battalion, 17th Infantry Regiment in Kandahar Province 2009 - Stryker Brigade Combat Team, Combat Record, Foothold in the Arghandab by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy