M3A1: Case Study: Textbook Case 5.1 Yahoo
Wins the Gold Medal and Silver Medals for the
Worst Hacks in History!
This activity addresses the following module outcomes:
MO1: Compare internal and external threats and the sources of data breaches.
(CO3)
MO2: Compare the types of general controls. (CO4)
Case Study:
There seems to be a cybersecurity headline once a week about at least one company
or government agency being hacked or reporting some type of breach. In this module,
you have learned about the challenges associated with cybersecurity and ways the
threats can be mitigated. You will focus on the challenges experienced by Yahoo in this
case study.
Write a 1.5 page paper not including the cover page or reference pages, that answers
the questions from the textbook case study 5.1 – Yahoo Wins the Gold Medal and Silver
Medals for the Worst Hacks in History! You must cite at least five independent scholarly
sources to support your position, using appropriate APA format.
Before you begin writing, please review the Case Study Guidelines download for
information.
Please take note of the resource listed below as you select external scholarly
sources for this assignment:
Excelsior College Library Homepage
Library Overview [VIDEO]: A brief introduction to the EC Library (Links to an
external site.) [Video file, 03:53 mins]
Starting Your Research Guide (Links to an external site.): It is highly
recommended you utilize the Excelsior College Library to conduct your research.
All students/researchers must be able to discern what is solid source/reference
material and what is not.
What is scholarly (sometimes referred to as peer-reviewed) (Links to an external
site.)? [Video file, 04:00 mins]
Scholarly sources can generally be identified by several features:
Content (topic being discussed)
Audience (for the layperson or someone familiar with the research on the
subject?)
Language (higher level language and discipline-specific terminology)
Intent (case study, report of experimental results, etc.)
Authorship (qualifications of author to write on the topic, usually an advanced
degree with years of experience and research on the topic)
Peer-reviewed (material is evaluated by experts and only published if it meets the
discipline’s standards)
References (other materials used in the research process are listed in a
bibliography or footnotes)
Listing (Check Ulrich’s in the Research Databases to see if the publication is
listed as refereed.)