1. Risks to Privacy from Collecting and Storing Data on a Computer
Data privacy means protecting personal, sensitive, or confidential information from misuse,
unauthorized access, or leaks. Whenever data is stored on computers or cloud systems, it becomes
vulnerable to cyberattacks, insider misuse, or poor security practices. A real world example is the Yahoo Data Breach in 2013 to 2014
Over 3 billion accounts were exposed due to stolen login credentials. Names, phone numbers,
and security questions were leaked, making phishing attacks easier. Some risks are Identity theft and fraud. Stolen data like SSNs and credit cards
can be used for fake accounts, loans, or scams. To prevent this from happening you can use VPNs, privacy browsers,
ad blockers, and limit personal info shared online.
2. Misuse of Computing ResourcesMisuse occurs when computing power, storage, or network bandwidth is exploited without authorization.
This wastes resources, lowers system performance, and can spread malware. A real world example of this is the Tesla Cloud Hack in 2018.
Attackers breached Tesla’s cloud servers and secretly installed cryptomining software, exploiting Tesla’s computing power for cryptocurrency profits.
The risks are that systems slow down or crash, reducing productivity and hijacked systems may be used to launch further attacks.
To prevent this you can train to detect phishing, malware, and suspicious requests or you can use an antivirus.
3. Unauthorized Access to Computing ResourcesUnauthorized access is when attackers break into systems, networks, or applications
without permission. This can be done via hacking, exploiting vulnerabilities, or tricking employees. A real world example is the Uber Breach in 2022.
A hacker tricked an employee through multi-factor authentication fatigue to gaining access to internal systems. The consequences of this is stolen information
which can lead to identity theft, blackmail, or resale on the dark web. Some ways to prevent this is an encryption which protects stolen data
from being readable if accessed and strong authentication like MFA, biometrics, and strict password policies.