Internet Research Project

Privacy, Security, and Computing Innovations

Privacy Risks in Data Collection and Storage

Many websites and apps collect personal information such as names, emails, passwords, and locations. This can be useful because companies use data to improve their services and make things more personal for users. However, collecting too much information can also be risky.

If a company does not protect data well, hackers may steal it. This can lead to identity theft, scams, or loss of privacy. Even trusted companies can have data breaches if their security is weak.

Another problem is that some companies share user data with other businesses. People may not always know how their information is being used. This is why strong passwords, privacy settings, and secure storage are important.

Example: A data breach can expose user emails and passwords.

Privacy image Data storage image

Source: FTC Privacy Information

Misuse and Protection of Computing Resources

Computing resources include computers, networks, servers, and software. These tools help people communicate, study, and work. But sometimes they are misused for harmful purposes.

For example, people may use computers to spread malware, send spam, or attack websites. Some hackers can even take control of devices and use them without the owner knowing.

To protect computing resources, people should install updates, use antivirus software, and avoid suspicious links. Schools and companies also need rules for safe and responsible technology use.

Example: A botnet uses many infected computers to attack a website.

Network image Protection image

Source: CISA Cybersecurity Tips

Unauthorized Access to Information

Unauthorized access means getting into accounts or systems without permission. Hackers often do this by guessing passwords, sending phishing emails, or finding weak points in software.

Phishing is a common trick where a hacker pretends to be a trusted company and asks for login information. If a person enters their password on a fake website, the hacker can steal it.

People can lower this risk by using strong passwords, turning on two-factor authentication, and keeping software updated. These steps make it harder for attackers to break in.

Example: A fake email from a bank can trick someone into giving away their password.

Hacking image Cybersecurity image

Source: IBM Data Breach Information

Benefits and Risks of Computing Innovations

Computing innovations have improved life in many ways. Phones, apps, cloud storage, and artificial intelligence help people communicate, learn, and solve problems faster.

At the same time, technology can also cause problems. Social media can spread false information, and some apps collect too much personal data. New tools can be helpful, but they can also be used in harmful ways.

This means technology has both benefits and risks. People should think carefully about how new inventions are used and how they affect society.

Example: Social media helps people connect, but it can also spread misinformation.

Technology image Innovation risks image

Source: Britannica Artificial Intelligence