Welcome to my website about Data Privacy, Security, and Ethical Computing. I will tell you about examples of breaches, or misuse of collected data, examples of computing resources like processing power, storage, networks, and cloud services, and how hackers gain unathourized access to computing Resources
Phising is sending fake or malicious links from supposed reputable sources. These links trick users into revealing sensitive data like login info, bank details, or social security numbers that let hackers get unauthorized access into people's social media or bank accounts
EXAMPLE OF PHISING: My friend got a dm from her friend on instagram who got hacked. Unfortunately my friend didn't know that, and knowing my friend trusted that account, the hacker sent a phishing link to vote for an art contest (for my friend's friend) which made her input her instagram login data. My friend got hacked because of this link and lost access to her account! This gave the hacker access to her DMs, and the ability to make fake posts for biddings for a car. Later I saw a DM from my friend's account asking me to vote for an art contest too!
Companies may secretly collect data when you use their websites or services or even when you're off their systems by tracking what you watch, what you search up, and what you like to send you targeted ads or to even collect personal information to sell to Data Brokers.
CLOUD: Your cloud is a space where you can download data and save it across multiple devices. It can be protected through encryption when codes your data to make it unreadable by people without a private key.
NETWORK: You can protect your network by implementing firewalls, encrypting, strong passwords, and by regularly updating your software. Installing well-known antivirus softwares can also help notify you for foreign viruses and help scan your devices for existing malware.
BIOMETRICS: Eye or fingerprint scans which can authorize that the correct person is entering a designated place or online space. SECURITY QUESTIONS: Questions asking only things authorized users should know like certain names, favorite foods, and special dates. EMAIL/TEXT MESSAGES: Verification messages can be sent to your email or number when entering your account on a website to which might give you a special link or a code to enter your account
Your data is encoded so that outside hackers or eavesdroppers cannot decode or read your data being sent to a specific person. That person will have a private key to decode the data.
From reputable companies, these systems when downloaded to your devices can help protect your data by catching and stopping foreign viruses, warning you of dangerous websites or downloads, and detecting malware.