HOME RISKS BEYOND PURPOSE BENEFICIAL AND HARMFUL RESOURCE MISUSE/PROTECTION

Your Work

Is it being watched?

You

In their sights?

Your Information

Is it being stolen?

Risks and How the Internet Can Be Used Beyond Its Intended Purpose


Random Name Random Name

There are big risks when storing personal information online and on the internet. If hackers or people with malicious intent gain access to your medical records or other private information, there are a large number of crimes they can commit. Gaining access to social security numbers, dates of birth, and other information that can be used to commit identity theft and take out loans in your name.

If your identity is stolen, this could lead to large purchases and bills in your name, and a lifetime of generational debt. Your credit would be lost and rejected as the person wearing your identity could create bank accounts and take out loans you can never pay back.

If hackers are able to hack into an airline or an online store’s database, they would have hit the jackpot and will be able to steal peoples’ personal information and bank details and sell them to a third party or the dark web.

Many websites already store your information without permission and knowing. Make sure your data is secure. Having a locked home wifi with a strong password can prevent any people who are interested in learning private things about you from joining. For that reason, public wifi is a big risk.



Unauthorized access to your information is gained in a multitude of ways. This includes lucky guesses, hypnosis, and corporate espionage. Having a weak password or no password at all may lead to people out for your information to guess into your information. Hackers use tools much like lock picks to crack passwords and get your information.

Another way unauthorized access to your information can be gained is through corporate espionage. There are full corporations that target old people who have money saved and other vulnerable victims to steal their money. These compamnies sometimes use hypnosis— even over the telephone— to trick people. Calls concerning starting a business that convinces the listener it is a matter of life or death. Sources say that it is like you become not yourself until families are bankrupt and the victim snaps out of it, left with nothing.

Random Name
Random Name
Random Name

Benefits and Harm

Of the Internet and Technological Advancments


Computing innovations can be both beneficial and harmful. As technology advances, it aids in the medical field as it improves medical care. It also allows for the quick connection between people and contacts as well as quick access to information.

Some disadvantages are job loss as industrialization results in machinery that can do work faster and better than human hands, Cyber bullying, and the loss of privacy.

Technology addiction also grows in strength. This may lead to a severe physical health decline, such as the Carpal Tunnel Sundrome which messes up the nerves on palms. Weight can have an extensive growth or loss which is unhealthy.

New York

Cyber Bullying


Paris

Health


San Francisco

Connect

×

Information

Resource Misuse and Protection Against It

Computing resources are infrastructural elements that receive, store, and analyze data to aid in problem solving and the creation of solutions; however, these resources can be abused and used to harm you. One of the improper use of equipment is Harrassment, destruction or damage to software and unauthorized monitoring of electronic communications.

People with malicious intentions can use intrusive ads to spread malwaar such as bugs. Bugs can change passwords and corrupt your data not only on your current device but every device connected to it.

Nevertheless, there are ways to defend against corruption. Antivirus and Antispy software is available to strenghten your firewall and make it harder to break through the defences around your private information. Strong passwords and being careful of what you click can also prevent unwanted software peering through your computer.

Random Name Random Name