Section 1: Risks to Privacy from Collecting and Storing Data on a Computer


When you need something online, you often collect and store data on your computer. However, what many people are unaware of is that there are often risks to storing data.

Risks

When storing and collecting data on a computer, you are at risk of malware.
Malware is Intrusive software cybercriminals use to gain access to data they otherwise shouldn’t have.
Malware can lead to data leaks or breaches, or the release of confidential information, encryption of files for ransom, where files are inaccessible until a payment is made,
slowing down performance due to malware using an excessive amount of CPU and memory, and many more risks.

Real Life Examples

Recently, in 2024, a trojan called “Antidot” was able to imitate a fake Google Play store app to trick users into downloading it. When downloaded, this virus would steal personal data from victims.

Magecart were hacker groups who would use skimming techniques on online websites. This means that they would breach into well known popular shopping websites to steal payment information when a customer made a purchase.

Another example would be when an employee of a South Georgia Medical Center had downloaded data onto his USB before quitting his job, this led to private information of patients being leaked online.

Prevention

To prevent risks when downloading on the interweb, there are preventative measures you can take. You can download an antivirus program to help detect and prevent viruses. You should also not download from fishy websites and only download trusted and well known data.



Section 2: Misuse of Computing Resources and How They Can Be Protected


The misuse of computing resources refers to the harmful use of computer systems, network, and data. Some examples of compute resources are CPU, storage, servers, memory, and cloud services.

Risks

When people misuse computing resources to often do activities such as hacking, you are at risk of leaking personal information or damaging your computer.
Common misuses include cryptocurrency mining on hijacked systems, spam distribution, malware hosting, illegal downloads.

Real Life Examples

Some real examples of the misuse of computing resources include back in 2018 when Tesla was a victim to cryptojacking.
Cryptojacking refers to the term when users gain access to computing devices to mine for crypto.
So when hackers would gain access to Tesla’s systems, a cryptomining software was deployed.

An example of malware hosting, another example of the misuse of computing resources, is when malicious users would use github to distribute the “Lumma Stealer” malware.

Back in 2004, a virus called “ILOVEYOU” was released to the public where the virus seems to be a love letter to users, and when users would open it,
the virus would execute to overwrite files and spread to other computers.


Prevention

To help protect computing resources, for example, a firewall can be used so that only safe and authorized internet traffic can be accessed.
Intrusion detections can also be used to protect your computer by monitoring for suspicious activity.



Section 3: Unauthorized Access to Computing Resources


Unauthorized access to computing resources is when malicious users gain access to or using a computer system that with no permission

Risks

When users gain access to your system without permission, anything on that system is available to unauthorized users,
such as your PII, or personally identifiable information. PII includes your name, social security number, address,
and more personal information.

Real Life Examples

Back in 2016, 360 million MySpace accounts were leaked on a website that let users search and access sensitive
information for a fee and was set up for sale on a dark web market.

An example of a breach of Linkedin was in 2012, where around 6.5 million passwords were accessed by hackers and
was posted on an online russian hacker forum. The same attacker was then found to
offer email addresses and passwords to linkedin users for cryptocurrency.

Another example was when National Public data had gotten breached and 2.7 billion accounts of personal
information such as names, social security numbers, and addresses were leaked on a hacking forum.

Prevention

To prevent attackers from accessing your personal information, you can use multi-factor authentication so that more than one piece of evidence is required to access an account.