StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Yahoo's Database Security - Coursework Example

Comments (0) Cite this document
Summary
This paper 'Yahoo's Database Security' will be divided into a number of segments, including types of Yahoo Databases and how they are used, security breach suffered by Yahoo, the problems faced when protecting users’ data, and the methods used by Yahoo to safeguard their users’ data. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Yahoos Database Security
Read Text Preview

Extract of sample "Yahoo's Database Security"

Download file to see previous pages Today, users get to access it quickly via typing a simple Uniform Resource Locator (URL) in their respective browsers; http://www.yahoo.com. However, the ever-changing technology has seen Yahoo face a number of attacks from hackers, resulting in the loss of data confidentiality and integrity because several users end up losing their logins credentials. In this regard, this paper will investigate security breaches suffered by Yahoo in the recent past.

For a structured understanding of this problem, this study will employ a descriptive research technique, using online sources as the primary source of data since it is desk research. In this regard, this paper will be divided into a number of segments, including types of Yahoo Databases and how they are used, security breach suffered by Yahoo, the problems faced when protecting users’ data, and the methods used by Yahoo to safeguard their users’ data. In the end, a conclusion will be provided.

In this system, the values of data are stored in a single field of a column; hence contrasts conventional databases, which stores values as individual records. Yahoo uses this system to achieve the highest degree of data compression, which ensures that it uses the minimal disk space to store user data; hence small and less costly hardware for storing data can be used (smadden, 2007).

In this system, information is distributed across several servers so that the distributed data can be individually processed by the respective servers’ processors. However, this is only possible in the presence of network interconnection. One advantage associated with this database is that no contention is available because it employs a shared-nothing architecture (Introduction to Massively Parallel Processing (MPP) database, 2012). Yahoo uses this system to parallelize execution of queries done by other Database Management Systems to ensure that those queries are divided into smaller ones and allocated to several Database management servers; thus, enabling it to concurrently process large amounts of data and ensure availability to users. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Yahoo's Database Security Research Paper Example | Topics and Well Written Essays - 1500 words, n.d.)
Yahoo's Database Security Research Paper Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/1871004-yahoos-database-security
(Yahoo'S Database Security Research Paper Example | Topics and Well Written Essays - 1500 Words)
Yahoo'S Database Security Research Paper Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1871004-yahoos-database-security.
“Yahoo'S Database Security Research Paper Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/1871004-yahoos-database-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Yahoo's Database Security

Methods for Database Security

...Yahoo s Database Security... Yahoo s Database Security... Database security has become one of the most important issues in today’s world of technology. This paper introduces the issue of database security in an organization by introducing the need and importance of database security. This is followed by a description of the main types of security threats that an organization would face, though the list is not conclusive. The main part of this paper discusses the ways that an organization can use to counter the threats identified in the previous parts of the paper. The methods to be used include data encryption, web-based data security, authentication and access control, timeliness and security in real-time database systems, SQL Injections,...
10 Pages (2500 words) Essay

Database and Enterprise Application Security

...Yahoo s Database Security... Yahoo s Database Security... and Enterprise Application Security Latest developments in internet have evolved to an elevated standard of technology. At the present, more and more corporations are making use of the internet in order to carry out their business related tasks. Additionally, the web based systems and business applications have offered better support and facilities for the business and personal level. However, these facilities have also created some concerns regarding web based security and privacy. In this scenario, there is an awful need for implementing proper and appropriate mechanisms in order to ensure internet security. In this paper I will present a deep analysis of some of the important aspects an...
7 Pages (1750 words) Essay

Database security Questions

...Yahoo s Database Security... Yahoo s Database Security... SECURITY QUESTIONS Database Security Questions Affiliation Q As a new Database Administrator, the first thing that you should do is developing a Database Security Plan As a new database administrator, the primary thing which we should do is to secure it from illegal and wrong access. Yet, the security of the database is considered just a sub-module of the entire computer security analysis. In this scenario, the limitations are obviously described along with reliable direction given to everyone working inside the corporation. Additionally, in a security plan declarations provide a way to guarantee that every worker recognizes the limitations and their consequences thereafter. In addition,...
3 Pages (750 words) Essay

Database Security

...Yahoo s Database Security... Yahoo s Database Security... Database Security Shakeel [Pick the Introduction As more and more increase in information day by day which results in increase in data, this data is stored on more and more database systems which are usually distributed. Big and medium businesses are susceptible to security breaches from outside which might compromise their competitive advantage. For the security breaches within data transfer, different encryption techniques are employed for the safe data travel but the data connecting to database servers must be subjected to policies and mechanisms to protect it from vulnerabilities. A broad spectrum of information security controls is employed on the database servers to protect it from...
4 Pages (1000 words) Essay

Yahoo's to rise fame

...Yahoo s Database Security... Yahoo s Database Security... Number Paper Yahoo’s Rise to Fame Yahoo! Inc is an international, American internet company which provides internet services to users and businesses internationally. It was founded by Jerry Yang and David Filo. Its business model that helped it grow to such great heights was based on using their online directory for commercial purpose. In order to maintain the company’s expansion, Yahoo needed to strengthen its core source of income and hired experts such as Tim Koogle and Jeffrey Mallet to run the company. Srinija Srinivasan was hired to help recruit IT software engineers to improve and expand the capacity and usefulness of the portal. The development of other Yahoo portals outside the U....
2 Pages (500 words) Essay

Database security issues

...Yahoo s Database Security... Yahoo s Database Security... Security Issues Hellion Craig World There has been a tremendous increase in data in the last decade and the trend is poised to continue. Databases having become more critical in the delivery of the enterprise promise. However, with the growth in database systems’ demand, security issues concerning the safety of the data stored has become a vital issue. This paper seeks to discuss some of the database security issues that are threaten to compromise the information stored by organizations. There has been a rapid growth uptake of cloud computing and hence database systems that are web based face even more security threats. The paper analyzes security issues concerning both web based and...
5 Pages (1250 words) Research Paper

Explain database security issues

...Yahoo s Database Security... Yahoo s Database Security... College: Explain Database Security Issues What is Metadata? Metadata refers to the data used in of other data. Metadata illustrates the quality, content, condition, as well as other features concerning data inscribe in an ordinary FGDC layout. The role of metadata is helping individuals in locating, as well as understanding, data. It also offers the history of given data by describing the data’s structure and content, its generator and preserver, its time of collection and publication, its geographic or storage location, reason for its creation, and means of producing, processing, or modelling it (Cox et al, 2012). A Concurrent Update A concurrent update refers to the situation in which m...
2 Pages (500 words) Essay

Development of database security

...Yahoo s Database Security... Yahoo s Database Security... of database security Introduction All the organizations deal with information of the products to be developed / sold and people working in the organization. As the higher management utilizes the information for making informed decisions, therefore, it is one of the crucial assets of the organization. Keeping in view the importance of the information and its enduring usage, it is required that the information needs to be secured and accurately stored in reliable database sources. “Information is an organizational asset, and, according to its value and scope, must be organized, inventoried, secured, and made readily available in a usable format for daily operations and analysis by individual...
4 Pages (1000 words) Term Paper

Database Security

...Yahoo s Database Security... Yahoo s Database Security... Security Database Security Introduction A database can be described as a compilation of logically consistent data that bears inherent meaning. Data bases are designed and populated with data that relates to a specific purpose and an interaction with the events of the real world and active audiences interested in the contents (Shekhar & Chawla, 2003). They are designed to operate large amounts of information by capturing, storing, managing and retrieving that information. Computerized databases are created and maintained by database management systems (DBMS) or a collection of application programs specifically written for that purpose. The DBMSs provide an interface that that enables users...
12 Pages (3000 words) Coursework

Database security

...Yahoo s Database Security... Yahoo s Database Security... Database Security and Privacy Principles Personal information (PI) could be gathered, held, and used for many different purposes and through different methods. Once information has been collected, various legal and ethical issues govern the right for access to such information. Some information is deemed to be confidential and this means that third parties may not acquire it legally (Doyle & Bagaric, 2005). Several laws relating to database security and privacy have been promulgated in different countries across the world. Database security entails the protection of collected information. If this is not done, then databases are subjected to several threats that could lead to loss of...
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Yahoo's Database Security for FREE!

Contact Us