Who We Are
Welcome to YSE
Yes! YSE is the social engineering hub for young minds. It is your first point of call for social information technology and products that offer solutions to daily problems across the globe. YSE is the Communication and Social Engineering arm of Dudu Spree’ LLC, based in Washington State, U.S.A. To this end, Youth Social Information Technology (IT) is an integral and critical component of YSE’s daily business.
Our Vision
Engineering social and connectivity tools for the Yoruba Nation.
Our Mission
Our team of young minds with IT skills is on the mission to develop software and hardware that enhances the security of the Yoruba Nation people and Cyber Space.
Our Services
Websites development
Websites Security
Administration
Ethical Hacking
Penetration Testing
Software Engineering/ Testing
Programming /Coding (JavaScript, Python, HTML, e.t.c)
Web Hosting / Server
Network/ service provision and Protection
Motto
YSE! Yes, YSE!!
YSE IT POLICY
Introduction
This policy seeks to ensure that YSE IT resources efficiently serve the primary business functions of YSE, provide security for YSE and members’ electronic data, and comply with federal and other regulations. IT resources include hardware (computers, servers, peripherals), software (licensed applications, operating systems), network equipment (routers, firewalls, wiring), and IT personnel. The integrity of all IT resources is extremely important to the successful operation of YSE business.
All computer equipment, peripherals, and software are YSE property and are provided for business purposes. Proper use and control of computer resources is the responsibility of all employees. Intentional or reckless violation of established policies or improper use of YSE computers will result in corrective action up to and including termination. Employees should also be aware that any work completed on YSE computers is subject to monitoring and review, and they should not expect their communications to be private.
This Policy supersedes any previous IT policies of YSE. The following Policy Statement, Disciplinary Action, and Review paragraphs apply to all individual policies contained within this Comprehensive IT policy.
Policy Statement
It is the policy of YSE to use IT resources in a cost-effective manner that safeguards member data and promotes the accuracy, safety, Information, and efficiency. The overriding goal of this policy is to comply with all federal and other regulations and to protect the integrity of the private and confidential member and business data that resides within the YSE technology infrastructure.
Disciplinary Action
Violation of any of these policies may result in disciplinary action which may include termination for members and temporaries; a termination of voluntary relations in the case of contractors or consultants; or dismissal for interns and volunteers. Following YSE policy. Additionally, individuals are subject to loss of YSE Information Systems access privileges and may be subject to civil and criminal prosecution.
Review and Acceptance
All YSE group members are responsible for reviewing and acceptance of this policy annually. Appropriate communications by way of reminder will be sent by Team Head or its assignee along with instructions for acceptance.
Policy 1: Acceptable Use of Information Systems
1.1 Definitions
Information Systems: All electronic means used to create, store, access, transmit and use data, information, or communications in the conduct of administrative, instructional, research, or service activities. Additionally, it is the procedures, equipment, facilities, software, and data that are designed, built, operated, and maintained to create, collect, record, process, store, retrieve, display, and transmit information.
Authorized User: An individual or automated application or process that is authorized access to the resource by the system owner, following the system owner’s procedures and rules.
Extranet: An intranet that is partially accessible to authorized persons outside of a company or organization.
1.2 Overview
Data, electronic file content, information systems, and computer systems at
YSE must be managed as a valuable organizational resource.
Information Technology’s (IT) intentions are not to impose restrictions that are contrary
to YSE established culture of openness, trust, and integrity. IT is committed to protecting YSE authorized users, partners, and the company from illegal or damaging actions by individuals either knowingly or unknowingly.
Internet/Intranet/Extranet-related systems, including, but not limited to, computer equipment, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing, and File Transfer Protocol (FTP) is the property of YSE. These systems are to be used for business purposes in serving the interests of YSE and its clients and members during normal operations.
Effective security is a team effort involving the participation and support of every YSE employee, volunteer, and affiliate who deals with information and/or information systems. It is the responsibility of every computer user to know these guidelines and to conduct activities accordingly.
1.3 Purpose
The purpose of this policy is to outline the acceptable use of computer equipment at
YSE. These rules are in place to protect the authorized user and YSE. Inappropriate use exposes YSE to risks including virus attacks, compromise of network systems and services, and legal issues.
1.4 Scope
This policy applies to the use of information, electronic and computing devices, and network resources to conduct YSE business or interact with internal networks and business systems, whether owned or leased by YSE, the employee, or a third party.
All members, volunteers/directors, contractors, consultants, temporaries, and other workers at YSE, including all personnel affiliated with third parties, are responsible for exercising good judgment regarding the appropriate use of information, electronic devices, and network resources following YSE policies and standards, local laws, and regulations.
YSE will offer the following support for the personal smart device: connectivity to YSE servers, including email and calendar, and security services, including policy management, password management, and decommissioning and/or remote wiping in case of loss, theft, device failure, device degradation, upgrade (trade-in), or change of ownership. YSE is not able to provide any additional assistance on any personally owned device and is not responsible for carrier network or system outages that result in a failure of connectivity to the YSE network.
The User assumes full liability including, but not limited to, an outage or crash of any or all of the YSE network, programming, and other errors, bugs, viruses, and other software or hardware failures resulting in the partial or complete loss of data or which render the smart device inoperable.
1.5 Policy Details
Responsibilities
YSE’s VP of IT has the overall responsibility for the confidentiality, integrity, and availability of YSE data. Other staff members, under the direction of the Director of IT, are responsible for following the procedures and policies within IT.
Supported Technology
All servers will be centrally managed by YSE’s IT Department and will utilize approved server configuration standards. Approved server configuration standards will be established and maintained by YSE’s IT Department.
All established standards and guidelines for the YSE IT environment are documented in an IT storage location.
The following outlines YSE’s minimum system requirements for server equipment supporting YSE’s systems.
Operating System (OS) configuration must be following approved procedures.
Unused services and applications must be disabled, except where approved by the Director of IT or the VP of IT.
Access to services must be logged or protected through appropriate access control methods.
Security patches must be installed on the system as soon as possible through YSE’s configuration management processes.
Trust relationships allow users and computers to be authenticated (to have their identity verified) by an authentication authority. Trust relationships should be evaluated for their inherent security risk before implementation.
Authorized users must always use the standard security principle of “Least Required Access” to perform a function.
System administration and other privileged access must be performed through a secure connection. The root is a user account that has administrative privileges which allow access to any file or folder on the system. Do not use the root account when a non-privileged account will do.
All YSE servers are to be in access-controlled environments.
All employees are specifically prohibited from operating servers in environments with uncontrolled access (i.e. offices).
This policy is complementary to any previously implemented policies dealing specifically with security and network access to YSE’s network.
It is the responsibility of any employee of YSE who is installing or operating server equipment to protect YSE’s technology-based resources (such as YSE data, computer systems, networks, databases, etc.) from unauthorized use and/or malicious attack that could result in the loss of member information, damage to critical applications, loss of revenue, and damage to YSE’s public image. Procedures will be followed to ensure resources are protected.
Policy 2: YSE Security
2.1 Set up a training program for our youths/volunteers
Use of materials from the support team head to training on-specific tools and workflows
Create exercises and FAQ sheets for reps
2.2 Create guide
Include feature overview, FAQs, Tools process, and technology
2.3 Set period targets for overviews and review period on a project
… and offer incentives related to the targets!
Policy 3: People & Website
3.1 Acquiring and Retaining Talent.
By creating a good environment for existing and potential youths.
Invest time and effort into talent issues to avoid being misunderstood.
3.2 Securing a Remote Workforce
We as YSE need to create a secure environment for users and help our people build safe habits while working remotely.
Successes
Challenges
Other Insights
Policy 4: Process
4.1 Securing Digital Transformation
We need to build security from the start and check-in frequently to create agile and secure user experiences.
Policy 5: Technology
5.1 Adopting Zero Trust
Managing access to sensitive information based on the principle of least privilege
5.1 Protecting Against and Responding to Ransomware
We need to put in our best to build defenses but also prepare for a breach and know how to recover.
Policy 6: Support Teams Needed
Administrator
Ethical Hacker
Penetration Tester
Software Engineer / Tester
Programmer /Coder /JavaScript / Python
Web Developer / Server
Network
Comments
What we need for support and work progress
Security Phones and Laptops installed with Flexispy
VPN (Proton VPN)
Proxy socks (911 or VIP72)
DISCLAIMER
YSE expressly disclaims, and the User releases YSE from, all liability for any loss, cost, or expense of any nature whatsoever sustained by the User in connection with the privilege afforded the User under the terms of the Agreement.