Internet Research Project

Privacy Risks in Data Collection and Storage

When sharing or storing personal data on social media or dating apps, it's always important to keep the possible consequences of oversharing information in mind. If your information is leaked, it could lead to break-ins, loss of money, and can even put your real life safety at risk. Dating apps are especially dangerous when it comes to monetary scams, where scammers will catfish people and ask them to send money. When posting on social media, others that see your posts can use the information you provide and can potentially harm you or your loved ones.


When companies are given sensitive information, like names, social security numbers, credit card information, and other information that can identify customers and employees, they store it in their files. They do this because the information is often needed to be called upon to complete transactions and other business functions. If this data falls into the wrong hands, it can lead to identity theft, fraud, and massive monetary losses. The risk of a security breach and its consequences, like the loss of customers, is too large for companies to take lightly. Because of this, safeguarding information is a big deal for companies.


Most companies follow a similar algorithm to ensure user data is not leaked. They first define who and how people send sensitive information to their businesses, whether it be through emails or cash registers in-person. They then need to think about what kind of information they receive through each entry point, such as credit card information online or customers’ checking accounts. One of their most important objectives is to decide where all the information from the entry points is kept, such as central computer databases or on individual laptops and hard drives. Finally, it is a necessity for companies to make sure that access to their sensitive information falls into the right hands, otherwise they could have massive problems.

image one image two

Misuse and Protection of Computing Resources

Misuse of computing resources is commonly referred to as “IT Abuse,” standing for informational technology abuse. It’s defined by willful and negligent misuse of technology that affects the availability or integrity of informational tech resources. In the current context, IT abuse can include the use of obscene language online, misuse of important property including electronic data and email, and the defacing/damage of important records.


IT Abuse can include a range of activities such as unauthorized software downloads, use of personal devices for business purposes, and participation in peer-to-peer file sharing networks. Even if the behavior isn't intended to harm the organization, it can still pose significant security risks. For example, surfing the web can lead to exposure to malicious code, and storing pirated content can result in copyright violation liabilities.


To protect valuable information, companies and websites use several strategies to protect systems and networks from exploitation. Some examples include regular software updates, so that known or discovered vulnerabilities are able to be defended against. Firewalls and antivirus programs are also a common method, which block malicious activity. Finally, regular backups are a staple of defense against exploitation, allowing data to be backed up from data loss or potential breaches.

image three image four

Unauthorized Access to Information

Hackers or users with malicious intent can gain unauthorized access to sensitive data by using various techniques. Phishing attacks are extremely common, where hackers use fake emails, websites, or identities to convince individuals into revealing sensitive information. Another technique hackers may use is malware, including the use of viruses, trojans, and ransomware, allowing hackers to exploit weaknesses and gain access to certain systems.


Hackers have a large variety of techniques to use, including exploiting vulnerabilities or flaws in the software by using cross-site scripting or SQL injection, a very common web hacking technique. Social engineering or psychological tactics may work, manipulating people into revealing confidential information or allowing unwanted people to gain access to things. Finally, weak passwords, which are also common among companies, are often just guessed and used by hackers to leak information without the company’s knowledge.


Businesses can also prevent data breaches through multiple methods, the first being to simply use a strong password that cannot be easily guessed, with a combination of different characters. Next, another simple method is multi-factor authentication, making users use two forms of evidence to access an account. Finally, using antivirus software forms a barrier of defense against malware, allowing businesses to protect themselves from threats in real time.

image five image six

Benefits and Risks of Computing Innovations

Innovations in computing offer numerous benefits, such as higher efficiency on things already possible, reduction of costs for certain operations, and possibly more ease of use when completing actions. They drive advancements in fields like AI (artificial intelligence), analytics, use of the cloud, and more. However, there can be negative consequences to computer innovation, like the well known fear of computers replacing human roles in jobs, and cybersecurity threats.


A well known example of technological advancement coming with unintended consequences is the development of social media platforms, which seemed to allow people from across the globe to connect with each other, and share their lives, but also lead to issues like cyberbullying and mental health issues in many of the younger generation, the massive spread of information, and privacy concerns due to people stalking or stealing information from one another using social media.


Another big advancement that came with a consequence is cryptocurrency mining, which was meant to turn computers into machines that would calculate complex problems and be rewarded with cryptocurrency for their work, allowing the owner of the computer to make money. Unfortunately, it led to significant energy consumption from people who set up large mining gigs with multiple computers, and had a bad impact on the environment for using so many resources.

image seven image eight
1

Powered by w3.css

Bibliography:

its.uky.edu

www.ftc.gov

security.virginia.edu

www.avasant.com

oag.ca.gov

www.strongdm.com

www.paysimple.com

www.msn.com

www.terawulf.com