Personal Privacy and the Public Internet

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

The Internet and the Web
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
The Internet.
Back to Table of Contents
WELCOME TO THE MCCLOUD SERVICES CUSTOMER WEB PORTAL TUTORIAL.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
How It Applies In A Virtual World
Jared Cinque Section 6.  Internet tracking is the process of following internet activity backwards from recipient to user through a special type of software.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Lesson 2 — The Internet and the World Wide Web
Staying Safe Online Keep your Information Secure.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Making Life and Communication Easier Neka Anyaogu.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
INTERNET. BROADBAND The amount of information a connection is capable of carrying. Measured in bits per second.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
Internet Safety Internet Safety LPM
Chapter Twelve Digital Interactive Media Arens|Schaefer|Weigold Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Restoring Privacy, Cleaning Your Computer's Cookies and Beacons.
Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Any criminal action perpetrated primarily through the use of a computer.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Social Network.
Marking the Most of the Web’s Resources
Section A: Web Technology
Hotspot Shield Protect Your Online Identity
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
Internet Identity, Safety, & Security
Unit 11 Using the Internet & Browsing the Web
Unit 12 Using the Internet & Browsing the Web
Internet and security.
Latest Updates on BlackHawk Mines Music : Privacy Policy
AOHT Hospitality Marketing
Information Security Session October 24, 2005
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Unit 27 Web Server Scripting Extended Diploma in ICT
Spyware. By: Katheryn L. Gaston.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Background survey Skills: none
Privacy Issues part 4 Information/data privacy
Being Aware of What You Share
The E-Commerce Act and the Right to Privacy
Internet Safety – Social Media
INFS 452 – Computer Ethics & Society
Francesco Giarletta.
What do we mean by WebData?
COMPUTER NETWORKS AND THE INTERNET Chapter 6
Presentation transcript:

Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700

How Much Did You Tell? "Most privacy violations don't come from whopping big intrusions but from the aggregation of hundreds of small bits of knowledge, none of which individually seems important. Who cares if someone knows your ZIP code or your social security number? What about a tossed-out receipt from your ATM or an old credit card receipt? What's your mother's maiden name? But put those violations all together and you're well on your way to identity theft -- or worse." InfoWorld. March 20, 2001. Electronic communication, the Web in particular, and data mining have changed the ways personal information can be collected. It’s not how much information you reveal at one time, but how much you reveal over time.

How Did You Tell? Cookies Web Bugs

How Safe Are Cookies? Cookies were intended to provide long-term “state” information, such as user ID’s or site preferences. By design, only a Web server in the domain of the server that creates a cookie can read that cookie. Internet Explorer 5.5 and 6.0 have a “backdoor” that allows any Web server to read any cookie on the user’s PC.

What’s in a Cookie? www.alphaworks.ibm.com FALSE / FALSE 1104538901 awMember John_Carter www.alphaworks.ibm.com FALSE / FALSE 1104538901 awMemberEmail jecarter@juno.com gserv.zdnet.co.uk FALSE / FALSE 1016756726 Apache 216.175.77.224.481801001031849261 This looks innocent enough, if reading is limited to the creator Web server. The hole in IE puts a different face on this information.

What’s in a Cookie? www.alphaworks.ibm.com FALSE / FALSE 1104538901 awMember John_Carter www.alphaworks.ibm.com FALSE / FALSE 1104538901 awMemberEmail jecarter@juno.com gserv.zdnet.co.uk FALSE / FALSE 1016756726 Apache 216.175.77.224.481801001031849261 Now any Web server has the potential to get my name and email address - and associate them with one or more IP addresses. Very specific identification of this user.

Innocent Website? This is how your browser normally sees this page from Microsoft’s Business Center.

Web Bugs - Invisible Invaders This is how the Bugnosis plug-in for IE sees the page. The little graphics mark the locations of “invisible” graphics - the Web bugs.

What Bugnosis Sees Tiny - very small Once - appears one time on the page Domain - not the same domain as the page you’re viewing TPCookie - a third party site is setting/reading a cookie Red = probable Web bug Yellow = suspicious

What Do The Links Mean? As the “invisible” graphics are downloaded from the specified server, some minimum information is being collected about the viewer by that server: Operating System Browser Type and Version IP Address Previous Page Viewed These items are part of the standard Web protocol and the teansactions are normally logged. The image server logs are analyzed for trends and for potential email targets.

How Is the Information Used? The intention is to track hits on pages and your page viewing to provide targeted advertising. If you visit two sites with digital camera information, the next ads you see will relate to digital cameras and accessories.

Do You Want Them to Know Where You’ve Been? The Network Advertising Initiative has a page that provides “opt-out” from most advertising data collection: http://www.networkadvertising.org/optout_nonppii.asp Not all Web advertising companies participate in this organization. Marketers consider your profile to be worth $0.10 to $2.50 depending on your interests and ZIP code. This is an additional source of income for the advertising companies.

Summary Do not reveal personal information inadvertently. Turn on cookie notices in your Web browser, and/or use cookie management software. Keep a “clean” e-mail address. www.eff.org/Privacy/eff_privacy_top_12.html Don’t provide any more information than is absolutely necessary. Consider whether the benefit offered in exchange for your email address or filling out a survey is worth the risk.

Questions? The original paper is on-line at http://pigseye.kennesaw.edu/~jcarter3/3700paper.html

Thank You