Risks to Privacy from Collecting and Storing Data

Definition: Personal and sensitive information stored digitally is vulnerable to misuse, theft, or surveillance.


Examples:
-the Equifax Breach(2017): 147 million people's financial information were exposed
-Facebook-Cambridge Analytica(2018): Data harvested for political advertisements
-China Face recognition Surveillance System: raises privacy concerns
Risks/Consequences:
-Identity theft and fraud
-Targeted advertisements + loss of privacy
-Government overreach
Solutions/Protections:
-Regulations (GDPR, CCPA)
-Encrypt sensitive data
-Transparency from companies
-User control of privacy settings

Misuse of Computing Resources

Definition: Unauthorized use of processing power, storage, or networks for criminal or unethical activities.


Examples:
-Cryptojacking – Hackers mine cryptocurrency on hijacked devices
-Mirai Botnet (2016) – Infected IoT devices for spam and DDoS attacks
-Illegal File Sharing – Pirated media consumes resources and spreads malware
Risks / Consequences:
-System slowdowns and higher energy usage
-Financial losses for companies
-Legal and ethical issues if systems are used in cybercrime
Solutions / Protections:
-Access controls and authentication
-Firewalls and intrusion detection systems
-Regular updates and patching
-User education to avoid malware and phishing

Unauthorized Access to Computing Resources

Definition: Attackers gain entry into systems without permission via phishing, malware, weak passwords, or social engineering.


Examples:
-Yahoo Breach (2013–2014) – 3 billion accounts compromise
-Colonial Pipeline Attack (2021) – Ransomware disrupted U.S. fuel supply
-Twitter Hack (2020) – Social engineering led to account takeovers
Risks / Consequences:
-Financial loss and identity theft
-Reputation damage for companies
-National security threats
Solutions / Protections:
-Multi-factor authentication (MFA)
-Encryption of sensitive data
-Regular security updates
-Employee and user training against phishing/social engineering

Conclusion

Data privacy, misuse of resources, and unauthorized access are critical issues in modern computing
Real-world breaches (Equifax, Mirai botnet, Colonial Pipeline) show the dangers of poor security and unethical practices
Stronger regulations, technical protections, and user awareness are essential to building a secure and ethical digital future