Security Analysis Of Yahoo

Great Essays
Introduction Yahoo Inc. is one of the largest multinationals whose headquarters is located in Sunnyvale, California in the United States. Jerry Yang and David Filo founded the multinational in January 1994 and it got its incorporated status on the second day of March 1995. Generally, the company has been viewed to be one of the earliest pioneers of the early Internet era in the 90’s. Presently, the president of the company is the former Google executive by the name Marissa Mayer. The company is generally known for its role in the provisions of web portal, search engine Yahoo, and other related services like the mailing services. The company is also known for offering news from all over the world as well as offering yahoo answers to provide …show more content…
As such, the company’s information technology department is concerned with the process of making sure that each of the organization’s computer systems are safe and free from any internal and external threats that may affect the operations of the business. As the company offers its services to different clients, the IT department makes sure that all operations are streamlined and that every system made to effect its operations is functional. Additionally, the department takes a center role in protecting its users from malicious attacks that could lead to different security threats being posed to the organizational product users. As such, some of the important personnel’s in the Information Technology include a number of programmers, different moderators, and system control engineers among other people who have the ability to detect any threat and any form of inappropriateness’ in the …show more content…
In this, it is highly expected that all members of the IT team should be aware of the roles that they are supposed to take for purposes of reporting any incident that might be reported in the organization. The organizational end users should learn how to report any suspicious activities to the right personnel rather than complaining by themselves and doing nothing. As such, to instigate what has been termed as a successful disaster response plan, an initial assessment of the situation needs to be carried out, the incident should be communicated effectively, any damages done should be contained and minimized, and an identification of the type as well as the severity of the compromise made being

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Swot Analysis Chipotle

    • 1103 Words
    • 5 Pages

    The marketplace is the ultimate goal which may decide their fate and they know this is where they need to be focused on. In an ever changing world, Apple, Chipotle, Google and PepsiCo rely on their mission to release every day innovation updates in keeping up with societies needs and wants. Google has released a new update to their search engine called, “Hummingbird Algorithm”. This helps people search for content.…

    • 1103 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    First, it is important to understand that through the application of some of the NIST security control mechanisms, the threat in the case can be substantially minimized. Some of the main approaches and methods that may be used towards minimizing the threat described include enhanced security awareness and training of the users of the system, access control into the system under consideration, frequent system maintenance and upgrades, occasional audits into the system, protection of the system from non-secured program codes, application of intrusion detection systems to detect any form of intrusions into the system and the protection of the system from spywares and spam. 14.5 The first and perhaps the most important value of the threat is that…

    • 252 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    1. Purpose After several security incidents Greiblock Credit Union (GCU) Board of Directors needs a sound policy to address the situation. The main objective of this document is to improve the security culture of the organization. The specifications of this policy will address dynamic vulnerability analysis, intrusion detection, and incident response.…

    • 1879 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Jerry Yang Research Paper

    • 852 Words
    • 4 Pages

    Before the wave of search engines we know today, navigating through the world wide web was chaotic. Two friends from Stanford University, Jerry Yang and David Filo, in their boredom, set out to develop a means of indexing and cataloging their favorite websites. (Clark) Little did they know this would lead to bigger and better things. What started out as a fun project for sharing websites, soon turned into a money making giant. A giant that would become what we now know as Yahoo, paving the way to the world wide web.…

    • 852 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    A technological issue that a Chief Information Officer (CIO) may have to deal with in the company that they work for, could be a malicious user breaking into the company’s data systems. The CIO ethical approach should be a teleological system. The CIO should take a utilitarian type approach with the subtype called rule-utilitarianism because the CIO should also be thinking about the employees and customers that can be in harm from this critical issue. In addition, this issue can cause a huge impact, damaging the company’s confidentiality, integrity and, availability. It is important for the CIO to collaborate roles, policies, costs, and benefits in order to define the situation in the best way that the CIO can.…

    • 263 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Sunnylake Hospital was a public center for helping people to cure their illness. Paul Layman, the CEO of the Sunnylake Hospital had joined the organization five years back with a vision of applying advanced technology to the communal center to form it into a hospital which is wanted after by the people. Paul applied electronic medical records (EMR) which substituted the customary method of prescribing and examining patient’s records through papers by changing them into digital data. One day an email pointing the mistake of the security systems of the organization was found in the inbox of Paul Layman mail by some nameless person. Paul had full belief in his IT division and its director of IT, Jacob Dale.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    College Security Risks

    • 1018 Words
    • 5 Pages

    As a security analyst in the Information technology environment at the Aim Higher College, I have seen many attacks from the hackers that attempt to steal the sensitive data of the college and expose it to the whole world or alter it in some way. I have seen the many threats that have existed on the college’s data and systems at one point. Furthermore, I discovered many vulnerabilities in college’s systems, I captured them before the intruders can get their hands on them and make an effort to exploit the vulnerabilities. Moreover, I gave many suggestions on how to fix and secure on many issues that were affecting the college’s network and systems.…

    • 1018 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The basic protection of data depends on update the anti-malware protection, firewall, and encryption. Creating some security awareness programs. All the people should maintain the data confidentiality and data integrity. In each organization…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Cenartech Case

    • 884 Words
    • 4 Pages

    One of the few saving graces was the IT manager’s awareness of the great need for standardizing backup procedures and related disaster recovery capabilities (Whitman & Mattord, 2011). This allowed the IT department to have the ability to recover almost everything that had been deleted or changed very quickly. The second saving grace was the firewalls between the different networks had prevented the attacker from connecting and causing further damage after being fired (Whitman & Mattord, 2011). Lastly, even if the IT manager was fairly new to this company, in two years it would seem he should he should have noted that employees were using the shared archaic, still-active accounts (Whitman & Mattord, 2011).…

    • 884 Words
    • 4 Pages
    Improved Essays