Welcome to my website about Data Privacy, Security, and
Ethical Computing. I will tell you about examples of breaches,
or misuse of collected data, examples of computing resources like
processing power, storage, networks, and cloud services, and how
hackers gain unathourized access to computing Resources

Examples of breaches or misuse of collected data

Phishing

Phising is sending fake or malicious links from supposed
reputable sources. These links trick users into revealing sensitive
data like login info, bank details, or social security numbers that
let hackers get unauthorized access into people's social media or
bank accounts

EXAMPLE OF PHISING: My friend got a dm from her friend on
instagram who got hacked. Unfortunately my friend didn't know
that, and knowing my friend trusted that account, the hacker
sent a phishing link to vote for an art contest (for my
friend's friend) which made her input her instagram login
data. My friend got hacked because of this link and lost access
to her account! This gave the hacker access to her DMs, and the
ability to make fake posts for biddings for a car. Later I saw a
DM from my friend's account asking me to vote for an art contest
too!

Targeted Advertising

Companies may secretly collect data when you use their websites
or services or even when you're off their systems by tracking what
you watch, what you search up, and what you like to send you
targeted ads or to even collect personal information to sell to
Data Brokers.

Examples of computing resources: Cloud Services & Network and

how they can be protected

CLOUD: Your cloud is a space where you can download data and save
it across multiple devices. It can be protected through encryption
when codes your data to make it unreadable by people without a
private key.

NETWORK: You can protect your network by implementing firewalls,
encrypting, strong passwords, and by regularly updating your
software. Installing well-known antivirus softwares can also help
notify you for foreign viruses and help scan your devices for
existing malware.

Preventative strategies: multi-factor authentication, encryption,
regular security updates

Multi-factor authentication includes biometrics,
security questions, and emails/text messages.

BIOMETRICS: Eye or fingerprint scans which can authorize that the
correct person is entering a designated place or online space.
SECURITY QUESTIONS: Questions asking only things authorized users
should know like certain names, favorite foods, and special dates.
EMAIL/TEXT MESSAGES: Verification messages can be sent to your email
or number when entering your account on a website to which might
give you a special link or a code to enter your account

Encryption

Your data is encoded so that outside hackers or eavesdroppers
cannot decode or read your data being sent to a specific person.
That person will have a private key to decode the data.

Antivirus/Antimalware software

From reputable companies, these systems when downloaded to your
devices can help protect your data by catching and stopping foreign
viruses, warning you of dangerous websites or downloads, and
detecting malware.