Unit 3 – Question 1

We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can leave traces of information with the use of technologies?

Today, we spend most of our time online. While using the Internet, we may leave traces of our information without even noticing. For examples:

Social networking applications: Be cautious about how much personal information you provide on social networking sites. The more information you post, the easier it may be for a hacker or someone else to use that information to steal your identity, access your data, or commit other crimes such as stalking.

– Online shopping:

  • Stolen account credentials. The email account and password associated with your purchase could be compromised. (And if you use those same credentials elsewhere, hackers can gain access to those accounts, too.)
  • Stolen financial information. Credit card information and bank information could give hackers full access to your finances.
  • Stolen identity. If more personal information is breached, you could fall victim to identity theft.

– Game online: When playing multi-player games, it’s very common to have a chat functions to talk with other players, your information can be extracted from the conversation. When you create online profiles containing sensitive information such as your name, phone number, and house address, it is also one way that you leave traces of information.

+ There are no comments

Add yours