ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.

Slides:



Advertisements
Similar presentations
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Advertisements

XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Sterling Heights Public Library Agenda n We’ll learn how to “clean up” the computers n We’ll review how SLC’s mail system works n We’ll review SpamLion.
Lecture 6/2/12. Forms and PHP The PHP $_GET and $_POST variables are used to retrieve information from forms, like user input When dealing with HTML forms.
Google Docs is a free, web-based office suite offered by Google within its Google Drive service. It was formerly a storage service as well, but has since.
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
Back to Table of Contents
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Communicating Information: Web Design. It’s a big net HTTP FTP TCP/IP SMTP protocols The Internet The Internet is a network of networks… It connects millions.
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Extras Plus! Pepper. Objectives extra knowledge Cookies Picture handling when creating site.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
CSE 154 LECTURE 13: SESSIONS. Expiration / persistent cookies setcookie("name", "value", expiration); PHP $expireTime = time() + 60*60*24*7; # 1 week.
1 The World Wide Web. 2  Web Fundamentals  Pages are defined by the Hypertext Markup Language (HTML) and contain text, graphics, audio, video and software.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Security of Cookies In A Public Computer Lab Setting Russell Fech November 30, 2000.
Jared Cinque Section 6.  Internet tracking is the process of following internet activity backwards from recipient to user through a special type of software.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
WEB ANALYTICS Prof Sunil Wattal. Business questions How are people finding your website? What pages are the customers most interested in? Is your website.
Computer Concepts 2014 Chapter 7 The Web and .
Chapter 16 The World Wide Web Chapter Goals Compare and contrast the Internet and the World Wide Web Describe general Web processing Describe several.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 43 Shopping on the Internet.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
CSE 154 LECTURE 12: COOKIES. Including files: include include("filename"); PHP include("header.html"); include("shared-code.php"); PHP inserts the entire.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 27 How Internet Searching Works.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
Week seven CIT 354 Internet II. 2 Objectives Database_Driven User Authentication Using Cookies Session Basics Summary Homework and Project 2.
COOKIES. INTERNET COOKIES What are they Where are they found What should you do about them.
Lecture 8 – Cookies & Sessions SFDV3011 – Advanced Web Development 1.
ITEC 1001 Tutorial 1 Browser and Basics. Web browser software & Web pages The Web is a collection of files that reside on computers, called Web.
11 1 Cookies CGI/Perl Programming By Diane Zak Objectives In this chapter, you will: Learn the difference between temporary and persistent cookies.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
Web Metrics Terminology & Measurement. Visit A visit is a Web user with a unique address entering a Web site at some page for the first time that day.
© 2010 Computer Science Faculty, Kabul University HTTP CONTINUED… 4 TH LECTURE 2, May, 2010 Baseer Ahmad Baheer.
Module 2 – User Safety Privacy Attacks on end users Browser vulnerabilities.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
XP Browser and Basics COM111 Introduction to Computer Applications.
ECMM6018 Enterprise Networking for Electronic Commerce Tutorial 7
1 State and Session Management HTTP is a stateless protocol – it has no memory of prior connections and cannot distinguish one request from another. The.
Web Measurement. The Web is Different from other Commuication Media More precise measurement of activity on Web sites is available More precise measurement.
ITM © Port,Kazman 1 ITM 352 Cookies. ITM © Port,Kazman 2 Problem… r How do you identify a particular user when they visit your site (or any.
Computer-made Cookies Presented by Helal Lutfi. What is a Computer Cookie?  A small text file which contains a unique ID tag.  Placed on your computer.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Any criminal action perpetrated primarily through the use of a computer.
COOKIES Gloria Soria Network Security COSC 356. What is a Cookie? A cookie is a piece of text that a Web Server can store on a user's hard disk. Cookies.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
CS 115: COMPUTING FOR THE SOCIO-TECHNO WEB TECHNOLOGIES FOR PRIVATE (AND NOT-SO-PRIVATE) COMMUNICATIONS.
How Works Ameera Al Ghamdi ID:
ITM 352 Cookies.
COOKIES.
Latest Updates on BlackHawk Mines Music : Privacy Policy
Database Driven Websites
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Configuring Internet-related services
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
HTML5 and Local Storage.
How Works Ameera Al Ghamdi ID:
2008 Workshop AHEPA District 3 Website Presentation
CSc 337 Lecture 27: Cookies.
CSc 337 Lecture 25: Cookies.
Presentation transcript:

ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy

Introduction  Privacy on the Net  Growing concern  Much information gathered  Who will use it?  How will it be used?  Three basic technologies of concern  Cookies  Tracking  Bugs

Introduction  Some technologies have useful purpose  Cookies  Tracking  May be used maliciously also  What if government is behind it?  “Big Brother”

Cookies  Small data file placed on your computer  May contain  Username and password  Favorite sites  Last time you visited  Uses:  Identifies your preferences  Eliminates need to log on

Cookies  Name comes from “magic cookie” as used by Unix programmers  Packet of data passed between programs  Nor meaningful itself  Used as an identifier like a coat check ticket  Created by Lou Montulli  1994 at Netscape

Cookies  Why cookies?  The Web is basically “stateless”  No memory of previous events  A site doesn’t “know” that  You’re a user  You have an ongoing “conversation”  Sites only  Accept requests  Deliver content

Cookies  Cookies are formatted in a special way  Can only be read by the site that placed them  Where are cookies stored?  Netscape  Cookies.txt file  Each line is one cookie  Internet Explorer  Tools … Internet Options … Settings … View Files

Cookies  How they work  You visit a Web site  Your browser examines the cookie files  If one from that Web site is found  Browser sends that file’s information to the site  Site now “knows” something about you  Servers can place cookies on your hard drive  With/without your permission

Cookies  Example – you’re shopping on the Web  Cookie established for you with a unique “shopping session ID”  May have an expiration date  Every time you put an item in your cart, the site’s server  Erases old cookie  Stores new cookie (with all your current items)  Server can read your cookie at any time to find the current status

Tracking  Examine log files  What pages are most popular?  What IP addresses are using a site?  How many pages are read in a typical visit?  What order are pages read in?  What page are users on when they click on a link that brings them to another page  Clickthrough

Tracking  Sniffers  Examine packets coming into or out of a site  Identifies users  Cookies  IP addresses

Tracking  Accumulates data about  Who is making requests?  Where are the requests coming from?  Average amount of time spent on a site  Average number of pages read per session  Most popular pages  Helps make sites better

Bugs  “Bug” as in “wiretap”  Can be included in  Lets others actually view your  Basic purpose is to trace a user’s use of the Web  Sites they visit  How they get from one site to another  Can also be used to intercept

Bugs  Works in HTML-enabled  An offer of some service or for a product  contains two items:  JavaScript code that can read the message  A “clear GIF”  HTML reference to a tiny graphic  One pixel in size  Transparent (so you can’t see it)

Bugs  The JavaScript code reads the  Your browser contacts the server to download the clear GIF  Remember what’s in a packet?  Identifying information  Your IP address  The server now knows something about you

Bugs  The server can place a cookie using identifying information sent by Web bug  Can match cookie with identifying information from the  Can now track your use of the Internet  Who responded to this offer  If that person forwards the to someone else the process begins again

Internet Passports  Lets user control  Which personal information can be released to a Web site  What type of information on surfing habits can be gathered  How that information can be used

Internet Passports  Variety of methods available  Platform for Privacy Preferences (P3P) P3P  Privacy Finder at Carnegie Mellon University Privacy Finder Privacy Finder  Internet Content and Exchange Standard (ICE) ICE  Open Profiling Standard (OPS) OPS  Starts by filling out a profile  For more information search for “internet passport” or go to

Privacy Organizations  Electronic Privacy Information Center 

Internet Passports  Starts by filling out a profile  Identifies person  Name, address, phone, etc.  Identifies Surfing data that can be shared  Or not!  Profile stored in browser  When person visits a Web site the passport is sent to that site

Internet Passports  Site’s server examines data in the passport  Might automatically log a person in if they included their username and password in the passport  While at site the person reads a sports story and buys a book  Profile permits inclusion of sports story but not about the purchase

Internet Passports  Person visits another site  That server “sees” that the person has recently read a sports story  But not about the purchase because the passport doesn’t permit it  Might then send him an ad about sports memorabilia  But not about books on sale

Internet Passports  At a different site the server “sees” that the person has restricted information about their buying habits  Server declines to send Web pages to a user with this kind of profile  The user can’t even view the Web site