Compare internal and external threats and the sources of


This activity addresses the following module outcomes:

MO1: Compare internal and external threats and the sources of data breaches. (CO3)

MO2: Compare the types of general controls. (CO4)

Case Study:

There seems to be a cybersecurity headline once a week about at least one company or government agency being hacked or reporting some type of breach. In this module, you have learned about the challenges associated with cybersecurity and ways the threats can be mitigated. You will focus on the challenges experienced by Yahoo in this case study.

Write a 2-3 page paper not including the cover page or reference pages, that answers the questions from the textbook case study 5.1 - Yahoo Wins the Gold Medal and Silver Medals for the Worst Hacks in History! You must cite at least five independent scholarly sources to support your position, using appropriate APA format.

Before you begin writing, please review the Case Study Guidelines Preview the document for information.

Please take note of the resource listed below as you select external scholarly sources for this assignment:

Library Overview [VIDEO]: A brief introduction to the EC Library [Video file, 03:53 mins]

 Starting Your Research Guide: It is highly recommended you utilize the Excelsior College Library to conduct your research. All students/researchers must be able to discern what is solid source/reference material and what is not.

. What is scholarly (sometimes referred to as peer-reviewed) [Video file, 04:00 mins]

Scholarly sources can generally be identified by several features:

Content (topic being discussed)

Audience (for the layperson or someone familiar with the research on the subject?)

Language (higher level language and discipline-specific terminology)

Intent (case study, report of experimental results, etc.)

Authorship (qualifications of author to write on the topic, usually an advanced degree with years of experience and research on the topic)

Peer-reviewed (material is evaluated by experts and only published if it meets the discipline's standards)

References (other materials used in the research process are listed in a bibliography or footnotes)

Listing (Check Ulrich's in the Research Databases to see if the publication is listed as refereed.)

Your assignment is due at the end of Module 3.

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. For those assignments that are not written essays and require uploading images or PowerPoint slides, please follow uploading guidelines provided by your instructor.

Solution Preview :

Prepared by a verified Expert
Business Economics: Compare internal and external threats and the sources of
Reference No:- TGS02843986

Now Priced at $25 (50% Discount)

Recommended (94%)

Rated (4.6/5)