Security Analysis Of Yahoo

Great Essays
Introduction Yahoo Inc. is one of the largest multinationals whose headquarters is located in Sunnyvale, California in the United States. Jerry Yang and David Filo founded the multinational in January 1994 and it got its incorporated status on the second day of March 1995. Generally, the company has been viewed to be one of the earliest pioneers of the early Internet era in the 90’s. Presently, the president of the company is the former Google executive by the name Marissa Mayer. The company is generally known for its role in the provisions of web portal, search engine Yahoo, and other related services like the mailing services. The company is also known for offering news from all over the world as well as offering yahoo answers to provide different answers to different questions that are raised by different users. Additionally, the company also offers online mapping platforms, advertising platforms, fantasy sports, and a social media website. As such, the provisions of these services by the company have made t to be known as one of the most popular sites from all over the world. Additionally, it is important to note that the company happens to provide some of the highest-read news and media website from all over the world with a record breaking seven billions per month. The company happens to be the fifth most visited website from all over the world as per the data provided on September 2016. Sources from the company have indicated that it attracts an approximated half a billion consumers every month by using different languages from all over the world. The Information Technology Department The information technology department of every organization is usually concerned with the process of studying, designing, and developing information that usually relates to the application of computers. …show more content…
As such, the company’s information technology department is concerned with the process of making sure that each of the organization’s computer systems are safe and free from any internal and external threats that may affect the operations of the business. As the company offers its services to different clients, the IT department makes sure that all operations are streamlined and that every system made to effect its operations is functional. Additionally, the department takes a center role in protecting its users from malicious attacks that could lead to different security threats being posed to the organizational product users. As such, some of the important personnel’s in the Information Technology include a number of programmers, different moderators, and system control engineers among other people who have the ability to detect any threat and any form of inappropriateness’ in the society. IT breach incident that affected Yahoo as a company There has been a number of IT security accidents that have been recorded over time and some have had very serious effects of the users of the involved sites. One of the serious IT breaches that took place in the world was that breach that affected yahoo as a leader in the provision of online related services. The breach affected a total of five hundred million user accounts as they were all reported to have been stolen by scrupulous Internet users with most of those who carry out these activities being reported to come from Russia. The breach that affected the company was termed as one of the largest single site breaches in history. Additionally, in the moth of August this year, a big number of hackers were identified trying to sell a total of two hundred million Yahoo accounts that would have affected the company greatly. After carrying out different data checks, the company confirmed that the data breach poised one of the …show more content…
In this, it is highly expected that all members of the IT team should be aware of the roles that they are supposed to take for purposes of reporting any incident that might be reported in the organization. The organizational end users should learn how to report any suspicious activities to the right personnel rather than complaining by themselves and doing nothing. As such, to instigate what has been termed as a successful disaster response plan, an initial assessment of the situation needs to be carried out, the incident should be communicated effectively, any damages done should be contained and minimized, and an identification of the type as well as the severity of the compromise made being

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Each employee should be held responsible for ensuring that their daily backup has taken place without any errors. If errors should arise, an IT Professional such as myself should be notified…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The basic protection of data depends on update the anti-malware protection, firewall, and encryption. Creating some security awareness programs. All the people should maintain the data confidentiality and data integrity. In each organization…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    These studies might show labor hours needed, hardware and software costs, utility costs and prevention of data lost. Another aspect of computer security is disaster recovery, this might include damage caused by a natural or manmade occurrence. Computer equipment that is damaged might include sensitive information stored on hard drives and these would either need to be recovered or disposed of. The key decision makers in a security project would include: Chief Executive Officer: The most senior corporate officer reports to the board of directors.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    SMC God nourished my growing knowledge of the Catholic faith. Challenging me to grasp the importance of stewardship and religion in my life through readings and discussions. SMC Civic Engagement exposed me to the hardships people in my community and beyond face, as well equipping me with tools to combat injustice. Encouraging me to not stand for injustice, but instead creating solutions to combat poverty in Latino community through the Guadalupe Community Center, where I helped at risk youth re-route their lives through mentorship. St. Mary’s Core challenges us to unravel what it means to be human.…

    • 221 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Swot Analysis Chipotle

    • 1103 Words
    • 5 Pages

    The marketplace is the ultimate goal which may decide their fate and they know this is where they need to be focused on. In an ever changing world, Apple, Chipotle, Google and PepsiCo rely on their mission to release every day innovation updates in keeping up with societies needs and wants. Google has released a new update to their search engine called, “Hummingbird Algorithm”. This helps people search for content.…

    • 1103 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    The goal of this step is to identify a list of system weakness, by using security test of system, audit comments and security requirements that could be exploited. These weaknesses generate the threat/vulnerability pair. Control Analysis For every threat/vulnerability pairs, identify all the possible existing and planned controls to decrease the risk of the threat to exploit vulnerability. Security controls involve the use of technical and non-technical approaches.…

    • 1790 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Jerry Yang Research Paper

    • 852 Words
    • 4 Pages

    Before the wave of search engines we know today, navigating through the world wide web was chaotic. Two friends from Stanford University, Jerry Yang and David Filo, in their boredom, set out to develop a means of indexing and cataloging their favorite websites. (Clark) Little did they know this would lead to bigger and better things. What started out as a fun project for sharing websites, soon turned into a money making giant. A giant that would become what we now know as Yahoo, paving the way to the world wide web.…

    • 852 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Sunnylake Hospital was a public center for helping people to cure their illness. Paul Layman, the CEO of the Sunnylake Hospital had joined the organization five years back with a vision of applying advanced technology to the communal center to form it into a hospital which is wanted after by the people. Paul applied electronic medical records (EMR) which substituted the customary method of prescribing and examining patient’s records through papers by changing them into digital data. One day an email pointing the mistake of the security systems of the organization was found in the inbox of Paul Layman mail by some nameless person. Paul had full belief in his IT division and its director of IT, Jacob Dale.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    College Security Risks

    • 1018 Words
    • 5 Pages

    As a security analyst in the Information technology environment at the Aim Higher College, I have seen many attacks from the hackers that attempt to steal the sensitive data of the college and expose it to the whole world or alter it in some way. I have seen the many threats that have existed on the college’s data and systems at one point. Furthermore, I discovered many vulnerabilities in college’s systems, I captured them before the intruders can get their hands on them and make an effort to exploit the vulnerabilities. Moreover, I gave many suggestions on how to fix and secure on many issues that were affecting the college’s network and systems.…

    • 1018 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Cenartech Case

    • 884 Words
    • 4 Pages

    One of the few saving graces was the IT manager’s awareness of the great need for standardizing backup procedures and related disaster recovery capabilities (Whitman & Mattord, 2011). This allowed the IT department to have the ability to recover almost everything that had been deleted or changed very quickly. The second saving grace was the firewalls between the different networks had prevented the attacker from connecting and causing further damage after being fired (Whitman & Mattord, 2011). Lastly, even if the IT manager was fairly new to this company, in two years it would seem he should he should have noted that employees were using the shared archaic, still-active accounts (Whitman & Mattord, 2011).…

    • 884 Words
    • 4 Pages
    Improved Essays