
Risks to Privacy from Collecting and Storing Data
Definition: Personal and sensitive information stored digitally is vulnerable to misuse, theft, or surveillance.
Examples: -the Equifax Breach(2017): 147 million people's financial information were exposed -Facebook-Cambridge Analytica(2018): Data harvested for political advertisements -China Face recognition Surveillance System: raises privacy concerns Risks/Consequences: -Identity theft and fraud -Targeted advertisements + loss of privacy -Government overreach Solutions/Protections: -Regulations (GDPR, CCPA) -Encrypt sensitive data -Transparency from companies -User control of privacy settings
Misuse of Computing Resources
Definition: Unauthorized use of processing power, storage, or networks for criminal or unethical activities.
Examples: -Cryptojacking – Hackers mine cryptocurrency on hijacked devices -Mirai Botnet (2016) – Infected IoT devices for spam and DDoS attacks -Illegal File Sharing – Pirated media consumes resources and spreads malware Risks / Consequences: -System slowdowns and higher energy usage -Financial losses for companies -Legal and ethical issues if systems are used in cybercrime Solutions / Protections: -Access controls and authentication -Firewalls and intrusion detection systems -Regular updates and patching -User education to avoid malware and phishing
Unauthorized Access to Computing Resources
Definition: Attackers gain entry into systems without permission via phishing, malware, weak passwords, or social engineering.
Examples: -Yahoo Breach (2013–2014) – 3 billion accounts compromise -Colonial Pipeline Attack (2021) – Ransomware disrupted U.S. fuel supply -Twitter Hack (2020) – Social engineering led to account takeovers Risks / Consequences: -Financial loss and identity theft -Reputation damage for companies -National security threats Solutions / Protections: -Multi-factor authentication (MFA) -Encryption of sensitive data -Regular security updates -Employee and user training against phishing/social engineering
Conclusion
Data privacy, misuse of resources, and unauthorized access are critical issues in modern computing Real-world breaches (Equifax, Mirai botnet, Colonial Pipeline) show the dangers of poor security and unethical practices Stronger regulations, technical protections, and user awareness are essential to building a secure and ethical digital future