Risks of Technology

A small sample of what hackers and do and what you can do to prevent this from happening. 

How can computing resources be misused and how can it be protected?

Misuse

     It is important to give employees access to technology to effectively and efficiently communicate with each other. However, technology brings temptations such as games, social media, videos, and shopping. People can also misuse computing resources through unauthorized file copying, downloading of software, music, P2P file-sharing, rogue remote access programs, misuse of business or personal email, instant messaging, blogging posting, and personal web surfing. One common misuse, especially in school, is social media and games. Often kids will dismiss what the teachers are teaching and proceed to casually play on their phones. However, this can be apparent at every stage of life in many different ways. 

Protection


     First, you must define misuse because employees watching TV while working is harmless if they use their wifi. Create clear policies that constitute proper use of company technology, including internet access, email systems, computers, printers, etc. Ensure workers know the policies and their consequences. And finally, use feedback to tweak the policies to your company's needs. Then you can limit the amount of time workers are allowed on applications they can access during work. Next, you can monitor the use of technology before it becomes an issue. 

     You can discuss what can happen if/when you violate the set policies. If someone does something unethical, you may have to report them to the police. Finally, you can give your employees approved apps and tools so that they don’t have to search. Allow them to have outlets when they are taking breaks and allow it for personal reasons to prevent misuse and misunderstanding. 

How unauthorized access to information is gained?

Guessing Passwords

 Manual password guessing by a person is done by people finding information that could be the password. In high-scaled attacks, they use software to guess your username, password, and personal identification numbers (PIN). People can also use software that uses bugs to steal information. This means you need to be extra careful with things that can contain bugs because you never know what they are trying to do. 

Physical Unauthorized Access

    Some people use normal things in order to get into a secure area. The people act like they belong there in plain sight. Lost, stolen, or copied identification cards can pose a risk of unauthorized access. Another way is just propping open a door or window. This allows people to gain access to restricted areas or spaces. Some common reasons for stealing information are stealing sensitive data, causing damage, holding data hostage, and playing a prank. 

Collusion

    People work together illegally to get into unauthorized areas or digital systems. Often insiders bring a plan and outsiders execute. A sophisticated party can override internal control and bypass security measures. This often occurs around big businesses that are competing for customers. They will get information about people from third parties and use it to disfavor customers. 
     One of the most common ways of colluding is price fixing. Price fixing occurs between companies to higher, lower, maintain, or control prices. These prices are made to forcibly drive out smaller companies or give them a disadvantage. Overall, price fixing can eliminate or reduce competition while also leading to even higher barriers for new entrants.