Security Analysis Of Yahoo

Amazing Essays
Introduction Yahoo Inc. is one of the largest multinationals whose headquarters is located in Sunnyvale, California in the United States. Jerry Yang and David Filo founded the multinational in January 1994 and it got its incorporated status on the second day of March 1995. Generally, the company has been viewed to be one of the earliest pioneers of the early Internet era in the 90’s. Presently, the president of the company is the former Google executive by the name Marissa Mayer. The company is generally known for its role in the provisions of web portal, search engine Yahoo, and other related services like the mailing services. The company is also known for offering news from all over the world as well as offering yahoo answers to provide …show more content…
As such, the company’s information technology department is concerned with the process of making sure that each of the organization’s computer systems are safe and free from any internal and external threats that may affect the operations of the business. As the company offers its services to different clients, the IT department makes sure that all operations are streamlined and that every system made to effect its operations is functional. Additionally, the department takes a center role in protecting its users from malicious attacks that could lead to different security threats being posed to the organizational product users. As such, some of the important personnel’s in the Information Technology include a number of programmers, different moderators, and system control engineers among other people who have the ability to detect any threat and any form of inappropriateness’ in the …show more content…
In this, it is highly expected that all members of the IT team should be aware of the roles that they are supposed to take for purposes of reporting any incident that might be reported in the organization. The organizational end users should learn how to report any suspicious activities to the right personnel rather than complaining by themselves and doing nothing. As such, to instigate what has been termed as a successful disaster response plan, an initial assessment of the situation needs to be carried out, the incident should be communicated effectively, any damages done should be contained and minimized, and an identification of the type as well as the severity of the compromise made being

Related Documents

  • Decent Essays

    Google Inc. Case Analysis

    • 784 Words
    • 4 Pages

    1. Introduction Google Inc. is an American company established on September 4th 1998 which provides internet-related services [1]. The company started off with a workstation in a parking space [2] and has grown to be the world’s second most innovative company [3], hiring more than 61,000 staffs [1] in over 40 countries around the world [4]. On August 19th 2004, an Initial Public Offering (IPO) took place on Wall Street [5] which led to the relocation of Google’s headquarters to Googleplex, Mountain View, California [2]. 2.…

    • 784 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Safety In The Workplace

    • 1112 Words
    • 5 Pages

    Preparations must ensure that any harm and benefits are spread equally among the persons under the corporate umbrella. For accountability purposes the protective program must be transparent and include all employees and community members in order to build a bond of trust. Preparedness should be purposeful in developing resistance to hazards and the ability to respond to return to business as normal as soon as possible. Appropriate preparation to protect the company, the employees and the community should incorporate the participation of public health professionals for their experience, knowledge and abilities to help in coordinating and appropriate response within the company safety program. Preparedness and appropriate responses by owners,…

    • 1112 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Port Scanning Policy

    • 729 Words
    • 3 Pages

    2. Policies Associated with vulnerability assessment and Penetration testing: Organizations should enforce policies that must be strictly adhered by all associated people to make penetration tests successful and maximize the vulnerability detection rate and fix the detected risks. a. Port Scanning Policy: 1. Purpose and Scope: The purpose of this port scan is to get the information about the devices connected in the network and get verified from the security officer so that none of the irrelevant ports are open and to make companies devices more secure.…

    • 729 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    For starters, every employee is a representative of the organization. Leadership may find it necessary to develop and routinely communicate rules of conduct as it relates to outside behavior deemed as embarrassing to the organization The organization then must designate the company representatives. These representatives must promote the values and best interest of the organization. This in an important part of any operation. It links the people in power and avoids confusion when negotiating goods or services.…

    • 860 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    An organization should have a conflict resolution policy in place and it should involve the HR manager to make the deciding factor in the matter. In order to avoid legal issues that arise from conflict, the HR manager should determine the cause of conflict in a timely manner and remain unbiased during the duration of the investigation. The HR manager should try to resolve the issue using as much company policy and procedures as possible and he/ she should be fair in determining the outcome. During a conflict, an employee may feel threatened or feel he/ she was treated unfairly which is a legal risk. The HR manager should follow all company policies and procedures to assure that their actions and reasoning is…

    • 858 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Regardless whether an organization is in the private or public sector, all licenses, medical coverage and other important documents must be up to date so as to eliminate loopholes in risk management. Secondly, risk management helps in identifying system and provider weakness before an adverse event occurs. An effective risk management system acts like the military since it provides first line of defense to the organization before the disaster strikes and reducing the impacts of losses in case the disaster strikes. Other than that, risk management provides the organization a cushion in case an event occurs. Since the organization will have a list of potential calamities set to strike the organization, they will be prepared to take the safety measures to iron out the risks in a more mature and timely manner that will benefit the…

    • 1039 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Internal Security Threats

    • 1296 Words
    • 6 Pages

    What this means is that the company is taking every precaution to have the right people on the job when it comes to security as well as the most up-to-date security systems available. A breach may happen, but knowing that your company has done everything to protect against an attack should allow some peace of mind. Two ways that resource allocation translates into the workplace are: 1. Adding further encryption to already secure sites. 2.…

    • 1296 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    That can make the subsidiaries lose their clients. b. Solutions: - Improve the connection between customers and company +Various the methods of contact: Hotline, customer service line, email, phone, fax,.. and makes sure all of them work well all the times, no technical problems which can prevent the customers from contacting company. + Customer service staffs are trained well: They must know who can deal with the customers problems quickly and effectively, prevent the situation that clients have to pass one by one but their problems are not be solved. + Staffs needs to be trained well to deal with the customers’ needs and have ability to rank the emergency of each situation and set them in priority or not.…

    • 1201 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Oracle Case Study

    • 726 Words
    • 3 Pages

    Oracle has many of the same cybersecurity requirements as any other corporation. Sensitive information of employees, customers, and the company itself must all be kept safe. This includes plans for upcoming acquisitions, programs that are being developed, and other trade secrets. Oracle’s network infrastructure must be kept save from attacks to allow the network to function properly. This can be accomplished by using firewalls, intrusion prevention/detection systems, strong encryption, and good security…

    • 726 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    First, the human resources department must contact each department in the building and the other facilities to notify them on the recent changes to the performance appraisal process. HR should inform everyone that performance appraisals will be taken seriously moving forward and there will be consequences if managers and supervisors fail to accurately fill out the paperwork. The establishment of HR policies is necessary to ensure all employees are aware of the recent changes and improvements to guarantee adequate performance measures. Next, Ms. Howell or any involved manager should identify what areas of work need examining, conduct a thorough and consistent measurement to reach a conclusion on employee performance, and inform employees on how they can reach their full potential in the future (Gomez-Mejia, Balkin, & Cardy, 2015). Finally, D-Bart Industries should train both the management giving the performance appraisals and the employees who are appraised.…

    • 1238 Words
    • 5 Pages
    Decent Essays