The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370355785
Publisher: Progressive Management Publication: October 3, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370355785
Publisher: Progressive Management
Publication: October 3, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination. But are the Millennials truly any more likely to become insider threats than members Generation X (GenX) or Baby Boomers?
This study shows that, contrary to conventional wisdom and societal belief, Millennials are no more likely to become insider threats than other generations; in fact, data shows they are less likely to do so than members of GenX.
CHAPTER I - INTRODUCTION * A. BACKGROUND * B. PROBLEM STATEMENT * C. RESEARCH QUESTION * D. LITERATURE REVIEW * 1. Who Is an "Insider" and What Is the Threat? * 2. Generations: What's in a Name? * E. METHODOLOGY * F. CHAPTER OVERVIEW * CHAPTER II - THE INSIDER THREAT * A. DEFINITIONS * B. MOTIVATION * C. US-CERT RISK FACTORS * D. CHARACTERISTIC ANALYSIS * E. CONCLUSION * CHAPTER III - ANALYSIS * A. DATA ANALYSIS METHODS * B. ESTABLISHING THREAT HIERARCHY * CHAPTER IV - INSIDER THREAT STATISTICS * CHAPTER V - CONCLUSION * A. CRITICAL ASSESSMENT * B. CONCLUSION

More books from Progressive Management

Cover of the book 20th Century Nuclear Power Plant Accidents: Three Mile Island (TMI) Reactor Accident in Pennsylvania - Partial Meltdown, Radiation Releases, Causes, Report of the Presidential Commission on TMI by Progressive Management
Cover of the book The Paradox of Power: Sino-American Strategic Restraint in an Age of Vulnerability - China and the U.S., Chinese Nuclear Weapons, Space, Cyberspace, Strategic Power, Cyber Warfare by Progressive Management
Cover of the book Chinese People's Liberation Army and Information Warfare: PLA, Network-Centric Warfare, Electronic and Cyber Warfare, China Espionage, Implications for United States, Psychological Warfare by Progressive Management
Cover of the book At Periscope Depth: Exploring Submarine Proliferation in Southeast Asia - Case Studies of Indonesia, Malaysia, Singapore, and Vietnam - Undersea Diesel Electric Subs, Philippines and Thailand by Progressive Management
Cover of the book String of Pearls: Meeting the Challenge of China's Rising Power across the Asian Littoral - Chinese Look Seaward, Sea Lines of Communication, South China Sea, Gwadar, Diaoyutai (Senkaku) Islands by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: The Army In Multinational Operations Field Manual - FM 100-8 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Wernher von Braun: His Life and Work from German Missiles to the Saturn V Moon Rocket - An Expansive Compilation of Authoritative NASA History Documents and Selections by Progressive Management
Cover of the book Overt Indicators of Islamic Extremism in Nigeria: Muslim Tradition, Possible Safe Haven for Terrorism, al-Qaeda Forces and Relationships, Dawa, Jihad, Madrassas, Sharia Law, Sunni and Salafi by Progressive Management
Cover of the book U.S. Marine Corps Aviation: Early Years 1912-41, World War II, Korean War, Southeast Asia, Martin MT, Grumman F3-F2, Curtiss SBC-4, John Glenn, F-86, Douglas F3D Skynight, Grumman F9F Panther by Progressive Management
Cover of the book Marines in World War II Commemorative Series: Cape Gloucester: The Green Inferno, Major General WIlliam Rupertus, New Britain, Borgen Bay, Volupai-Talasea, LCMs, DUKWs by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Pituitary Tumors, Adenomas, Carcinomas - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: River-Crossing Operations - FM 90-13 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Complete Guide to the American Civil War Battle of Gettysburg: Troops, Biographical Sketches of Leaders, Weaponry, Small Arms, 150th Anniversary, Strategic Setting, Operational Art, Legacy by Progressive Management
Cover of the book Saturn IB Flight Manual (Skylab Saturn 1B Rocket) - Comprehensive Details of H-1 and J-2 Engines, S-IB and S-IVB Stages, Launch Facilities, Emergency Detection and Procedures by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Gestational Trophoblastic Tumors, Hydatidiform Mole, Choriocarcinoma, GTD, GTT, GTN, PSTT - Clinical Data for Patients, Families, and Physicians by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy