Internet Research Project

Privacy Risks in Data Collection and Storage

DataCollection Data Collection privacy risks

As businesses collect, use and sell their customer data, customers/users often remain unaware of how their information is being used and lack the ability and knowledge to stop the collection of this data. The absence of a comprehensive data privacy law in the U.S also increases risks of privacy breaches as well. Data can also be used incorrectly as the usage of that data can lead to the creation of biased outcomes, inaccurate scores, and differential treatment of customers when it comes to advertising and making large reports.

To protect their user data, most companies usually have regular risk assessments, fairly strong security policies, access controls, and encryption to protect this information. Companies also stay updated with the latest security patches for protection software and use cybersecurity risk assessments to identify and try and avoid vulnerabilities.

An example of a large company protecting data is Google. Google, being one of the largest data collection and sale companies in the world, use very comprehensive and specific strategies to protect their user data. Google uses regular vulnerability scans to detect weaknesses in their systems. Once identified Google implements security patches to mitigate these vulnerabilities. Google also scans and monitors their systems and security measures 24/7 to make sure their data is safe, secure, and maintains its integrity.

Misuse and Protection of Computing Resources

cybersecurity diagram picture of stuff that can be stolen

Common ways that computing resources are misused include data theft, identity theft, piracy, illegal software distribution, and cyber fraud. Employees can also misuse IT resources by visiting unsafe and unauthorized websites as well as use peer-to-peer file sharing. These actions can result in security threats, breaches, and malware infections, which can lead to serious financial, legal, and reputational damages.

To protect systems and networks from exploitation, organizations implement a variety of strategies, such as utilizing security software. Regular software and network security updates can help to patch vulnerabilities that people with malicious intent cannot break through. Privileged access management is also a tactic employed to make sure that only authorized and trusted personnel have access to vital and critical information/systems.

Additionally, organizations can protect network edge devices by following guidance and strategies from cybersecurity experts and authorities. This can include the use of hardening devices, security measures, and continuous monitoring. By adopting an in depth security approach and staying vigilant to possible threats can significantly reduce the possibility of breaches and exploitation.

On example of piracy is when a person downloads a movie or software without paying for it. This is illegal and can result in fines and legal action. Another example is when a person uses someone else's credit card information to make purchases online. This is identity theft and can result in serious consequences. To protect against these types of misuse, it is important to use strong passwords, keep software up to date, and be cautious when sharing personal information online.

Benefits and Risks of Computing Innovations

Benefits and Risks of Technology Advantages of Cloud computing

Computing innovations offer many benefits, such as increased efficiency, improved communication, and enhanced data analysis capabilities. These advancements have completely changed and revolutionized industries by automating tasks, enabling remote work, and providing valuable insight by using big data analytics. These benefits also come with challenges as privacy concerns are becoming more and more of a problem as well as cyber security threats, job displacement, and more. Balancing these benefits and consequences is a big challenge that needs to be overcome to have a large positive impact on the future.

Technological advancements have also sometimes led to unintended consequences beyond their original purpose. For example, the rise of social media in recent years has gone from a way to share information and connect people to a place to spread misinformation, cyberbullying others, and the creation of mental health problems. Another example is the rise of autonomous vehicles that are made to improve road safety and improve traffic, but it raises ethical questions about decision making in critical situations and potential job losses for those in the transportation field. These cases bring up the importance of considering the broader impact of new technologies and implementing safeguards to address these potential negative impacts.

To address these unintended consequences, it is essential to adopt a proactive approach to new technologies.This includes conducting impact assessments, engaging with stakeholders, and implementing ethical guidelines, when creating or updating new tech. Continuous monitoring and evaluation of new developments can help identify any potential adverse effects early on in development.

Unauthorized Access to Information

Shield with lock Computer with lock and data

Hackers gain unauthorized access to information through various techniques. One common method is exploiting software vulnerabilities, such as SQL injection and cross-site scripting (XSS), which allow attackers to inject malicious code into systems. Phishing attacks are also common, which is where attackers deceive individuals into revealing information by impersonating trusted people. Additionally, social engineering tactics manipulate people into sharing confidential information or performing actions that would compromise security.

Data breaches often occur due to weak security measures and human error. Attackers may use malware or viruses to infect systems and steal information. Distributed Denial of Service (DDoS) attacks are also common, and it's when attackers overwhelm servers with traffic causing disruptions and possibly data exposures. Another method is exploiting “backdoors” created by poorly written code or weak system defenses, allowing unauthorized access to sensitive data. These breaches can lead to significant financial, reputation, and legal damages.

To prevent these breaches, organizations must implement effective cybersecurity measures. One example is Multi-factor authentication, or MFA, and it adds another layer of security by requiring multiple forms of human verification before granting access. Regular software updates and patch management help address vulnerabilities that attackers can exploit. Educating employees about how to defend against these attacks and how to avoid these situations is necessary as well to defend against the human aspect. Using stronger passwords and good password managers can also help security as well as monitoring systems for unusual activity can help detect potential breaches.

Sources

Section 1:


Section 2:


Section 3:


Section 4:

Images: