This article discusses the risk analysis and protection strategies for Expedia Inc. in the field of computer systems security. It explores the use of cloud computing and AWS services, and the protection against risks like malware attacks, insider threats, and breach of privacy contracts. The article also covers the identification and prioritization of assets, identification of threats and vulnerabilities, analysis of controls, determination of probability and impact, and prioritization of information security risk. The subject is Computer Systems Security, and the course code is not mentioned. The college/university is not mentioned.