Research Project

Welcome to the Project of Marwan Elsadek

Nature

The risks to privacy from collecting and storing personal information

There are a lot of risks abot this. For instance, your medical conditions could be shared without your consent, or your banking data could be made available to third-parties. You might have your emails hacked, Your identity could be stolen. The risks are more far-reaching than most people realize because of what might happen to your data next.

The more data that is collected and logged, the greater the chance of leaks or security breaches occurring. These leaks result in the loss of personal things such as identification numbers, financial data and even health information, with consequences for individuals.

Data breaches, data brokerage, and data discrimination can occur if big data privacy isn’t taken seriously. For this reason, data governance and integration are vital for proper compliance and privacy management. If your organization is searching for a big data privacy solution, Talend Data Fabric collects, governs, transforms, and shares data with internal stakeholders while ensuring data privacy. Try Talend Data Fabric today to reduce the risk of privacy issues often associated with big data and ensure your company has data it can trust

Norway
Norway

How can computing resources be misused and how can it be protected?

Examples include unauthorized file copying; downloading of software, music, or other media; P2P file-sharing; rogue remote access programs, modems, and wireless access points; misuse of business or personal email; instant messaging; blogging and posting to message boards; and personal web surfing.

Keep your device secure. Make sure to download recommended updates from your device's manufacturer or operating system provider, especially for important software such as your internet browser. Antivirus software, anti-spyware software, and firewalls are also important tools to thwart attacks on your device.
.
Computing recorces can also be misused when people use them in wrong ways.

Norway

How unauthorized access to information is gained?

Unauthorized access occurs when individuals gain access to an organization's networks, systems, applications, data, or devices without permission. This typically involves a network security breach that can compromise network integrity or lead to data loss.

Some examples for instance are: Asking to “borrow” or taking another employee’s badge, Trying to “piggyback” by following another individual through access doors. Logging on to a computer using a co-worker’s password or credentials.

Also some exapmples sre clicking links from people you don't know, or even people you do know, because they can send links without knowing.

Norway
Norway

How computing innovation can be beneficial and harmful.

The effects of technology on society have been both positive and negative. While technology has made it easier to connect with others, access information, and improve medical care, it has also led to job loss, cyberbullying, and technology addiction.

A computing innovation may encompass the physical, like a self-driving car, nonphysical computer software like image editing software, or an invisible computing idea like e-commerce.

While for many computing innovations, the effects are up for debate. People can have widely differing opinions—some people might think a certain computing innovation is good, and some people might think it's bad. The same person can think a computing innovation is both good and bad.

Norway
Norway

How computing innovation can be beneficial and harmful And how computing innovation can have impact beyond its intended purposes .

The effects of technology on society have been both positive and negative. While technology has made it easier to connect with others, access information, and improve medical care, it has also led to job loss, cyberbullying, and technology addiction.

A computing innovation may encompass the physical, like a self-driving car, nonphysical computer software like image editing software, or an invisible computing idea like e-commerce.

While for many computing innovations, the effects are up for debate. People can have widely differing opinions—some people might think a certain computing innovation is good, and some people might think it's bad. The same person can think a computing innovation is both good and bad.

Computing innovations have often had unintended beneficial effects by leading to advances in other fields. Rapid sharing of a program or running a program with a large number of users can result in significant impacts beyond the intended purpose or control of the programmer.

Norway