Ch 158: Cookies and Web Bugs What They Are and How They Work Together

Slides:



Advertisements
Similar presentations
The Internet and the Web
Advertisements

WEB DESIGN TABLES, PAGE LAYOUT AND FORMS. Page Layout Page Layout is an important part of web design Why do you think your page layout is important?
Cookies, Sessions. Server Side Includes You can insert the content of one file into another file before the server executes it, with the require() function.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
The Internet 8th Edition Tutorial 1 Browser Basics.
1 The World Wide Web. 2  Web Fundamentals  Pages are defined by the Hypertext Markup Language (HTML) and contain text, graphics, audio, video and software.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Behavior Tracking Dhaval Patel.
Chapter 9 Collecting Data with Forms. A form on a web page consists of form objects such as text boxes or radio buttons into which users type information.
1 Web Developer & Design Foundations with XHTML Chapter 6 Key Concepts.
Computer Concepts 2014 Chapter 7 The Web and .
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Comp2513 Forms and CGI Server Applications Daniel L. Silver, Ph.D.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
JavaScript, Fourth Edition
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
CSE 154 LECTURE 12: COOKIES. Including files: include include("filename"); PHP include("header.html"); include("shared-code.php"); PHP inserts the entire.
(or ?) Short for Electronic Mail The transmission of messages over networks.
Tutorial 1: Browser Basics.
Chapter 8 Cookies And Security JavaScript, Third Edition.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
Lecture 8 – Cookies & Sessions SFDV3011 – Advanced Web Development 1.
Cookies Web Browser and Server use HTTP protocol to communicate and HTTP is a stateless protocol. But for a commercial website it is required to maintain.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
Web Metrics Terminology & Measurement. Visit A visit is a Web user with a unique address entering a Web site at some page for the first time that day.
Cookies and Sessions IDIA 618 Fall 2014 Bridget M. Blodgett.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
ASP. What is ASP? ASP stands for Active Server Pages ASP is a Microsoft Technology ASP is a program that runs inside IIS IIS stands for Internet Information.
Living Online Lesson 3 Using the Internet IC3 Basics Internet and Computing Core Certification Ambrose, Bergerud, Buscge, Morrison, Wells-Pusins.
ECMM6018 Enterprise Networking for Electronic Commerce Tutorial 7
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Web Design and Development. World Wide Web  World Wide Web (WWW or W3), collection of globally distributed text and multimedia documents and files 
Restoring Privacy, Cleaning Your Computer's Cookies and Beacons.
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
ITM © Port,Kazman 1 ITM 352 Cookies. ITM © Port,Kazman 2 Problem… r How do you identify a particular user when they visit your site (or any.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
Unit-6 Handling Sessions and Cookies. Concept of Session Session values are store in server side not in user’s machine. A session is available as long.
Sessions and cookies (part 2) MIS 3501, Fall 2015 Brad N Greenwood, PhD Department of MIS Fox School of Business Temple University 11/19/2015.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COOKIES Gloria Soria Network Security COSC 356. What is a Cookie? A cookie is a piece of text that a Web Server can store on a user's hard disk. Cookies.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
CS 115: COMPUTING FOR THE SOCIO-TECHNO WEB TECHNOLOGIES FOR PRIVATE (AND NOT-SO-PRIVATE) COMMUNICATIONS.
Tonga Institute of Higher Education IT 141: Information Systems
CSE 154 Lecture 20: Cookies.
The Internet Industry Week Two.
Unit 11 Using the Internet & Browsing the Web
Evolution of Internet.
Web Caching? Web Caching:.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
CSc 337 Lecture 27: Cookies.
CSc 337 Lecture 25: Cookies.
Presentation transcript:

Ch 158: Cookies and Web Bugs What They Are and How They Work Together http://www.abine.com/tracking.php

Online Tracking !privacy easy it Tracker To ISPs, Websites, advertising networks To Provide: targeted advertising Classify: you into a demographic group Resell: information about you to other companies

Tracking Techniques Cookies, IP Addresses, Web Bugs, browsing history, others.

Cookie Small unique text file Created by: a Web site Sent to: computer’s hard drive. Record: client mouse-clicking choices each time you get on the Internet.

Cookie Browser contacts a server and requests the specific Web site. every time you visit that site they know its you Browser contacts a server and requests the specific Web site. searches your hard drive to see if it already have a cookie file from the site.

Cookie If NO If YES an ID is assigned to you this initial cookie file is saved on your hard drive. If YES the unique identifier code, previously recorded in your cookie file, is identified and your browser will transfer the cookie file contents back to that site. Now the server has a history file of actually what you selected when you previously visited that site. You can readily see this because your previous selections are highlighted on your screen.

Cookie if somebody has access to your computer they can often use cookies to see what sites you have visited in the past

Types of Cookie HTTP Cookies - persistent "Session" Cookies Third Party Cookies Flash cookies http://en.wikipedia.org/wiki/HTTP_cookie A visitor cookie A preference cookie A shopping basket cookie A tracking cookie.

HTTP Cookie come from the Web site that you are visiting usually intended to stay around permanently and each time you are online. Recommendation To be deleted at the end of each browser session.

Session Cookies Expire when you close your browser. Some sites, such as Gmail, require the use of cookies during a session in order to function properly, but they don't need to have cookies stored permanently on your computer. Recommendation allow session cookies to avoid breaking functionality on certain Web sites.

Third Party Cookies Web pages often have pieces of content from more than one source such as ads posted along the sidebar of a Web page you are viewing. set the cookies Domains other than the main page you are viewing third parties. used by advertisers to track users across multiple Web sites. Recommendation block third part cookies.

Flash cookies Unlike the other cookies with are controlled through the cookie & privacy controls in your Web browser activated through a feature in Adobe's Flash plug-in called "Local Shared Objects" (LSOs). This means that even if a user has cleared his or her cookie settings (by directing your browser to “block” or “delete” cookies), sites can still use a feature of Flash to track your online behavior. Among other things, Flash cookies are used to ensure smooth playback on sites that stream music and video. Recommendation delete all Flash LSOs at the end of each browser session. Note that this is not done the way other cookies are deleted; instead, a user must visit Adobe’s site for the deletion controls or use other software.

A visitor cookie. The most common type . keeps track of how many times you return to a site. alerts the Webmaster of which pages are receiving multiple visits.

A preference cookie stores a user’s chosen values on how to load the page. it is the basis of customized home pages and site personalization. It can remember which color schemes you prefer on the page or how many results you like from a search.

A shopping basket cookie is a popular one with online ordering. It assigns an ID value to you through a cookie. As you select items, it includes that item in the ID file on the server.

A tracking cookie. The most notorious and controversial . It resembles the shopping basket cookie, but instead of adding items to your ID file, it adds sites you have visited. Your buying habits are collected for targeted marketing. companies can save e-mail addresses supplied by the user and spam you on products based on information they gathered about you.

Cookie Usage After you type a URL in your browser, it contacts that server requests that Web site. The browser looks on your machine to see if you already have a cookie file from the site. If a cookie file is found your browser sends all the information in the cookie to that site with the URL. When the server receives the information, it can now use the cookie to discover your shopping or browsing behavior. If no cookie is received an ID is assigned to you and sent to your machine in the form of a cookie file to be used the next time you visit.

Cookies: left on your computer generally store Cookie Usage Cookies: left on your computer generally store a unique serial number used to identify you to keep track of all your visits to a certain Web site and any "network" of sister sites.

Cookie Usage If third party cookies be stored Advertisers can Network = several advertising company sites each time you visit a Web site in the cookies "network“ can track you as you travel among these different sites. Advertisers can create a profile of you based on your browsing behavior as well as store your browsing history as long as they like.

IP Address Websites To prevent receive your computer's current IP address can figure out where you are geographically keep track of all connections from the same IP address. if your IP address doesn't change then they have a good idea it's you -- every time you visit. If you use a cable modem you may have a dynamically assigned IP-address, but these tend not to change very often. Most other forms of Internet access use static IP addresses. To prevent proxy : Proxy does see all of your traffic.

can track you as you move among Web sites within their network Web Bug can track you as you move among Web sites within their network Web bug = beacons a graphic: on a Web page or in an HTML-based e-mail message to: track who is viewing the page (or email). can provide IP address Time recipient wishes that information disclosed or not. how often a message is being forwarded and read. More

Web Bug

Web Bugs Usage Web Bugs: notify their server each time their page is accessed. The site: knows that the page with the bug on it has been accessed, and by what IP address Advertisers: can correlate your visits to their sites by looking at the timestamps of the requests from the Web bugs you triggered use your IP addresses browsing sessions on their sites to build up their profile.

Web Bugs Usage HTML-based emails: they can tell if you've opened their email and where you were when you opened it.

Tracking Methods JavaScript trackers. pieces of JavaScript usually come from other sites. When the Web page loads in your browser it makes a request to include a piece of code from the tracking server.

Tracking Methods One-pixel images and other SRC tags. Images tags in HTML pages actually directions that tell your browser where to find the image it is supposed to display to you. This means that when your browser displays a Web page to you it makes a request to the tracking server for the image. the image is a transparent 1-pixel image it is not really mean to be viewed it's really just a tracking method.

Tracking Methods Browser Fingerprinting. It is also possible to identify a specific browser by looking at details about the browser software and components directly. Currently not aware whether this is being done by Web sites in the field it does represent the next frontier in online privacy. Visit to get your browser fingerprinted and see how unique your browser fingerprint may be.

Browser History to see: portions of your browsing history. Websites can look at your browsing history through : JavaScript , CSS technique to see: portions of your browsing history. To do this the Web site has a list of all of the sites it is interested in if you are keeping a browsing history they can learn whether that you have visited those target sites in the past. used by advertising groups to put you into a demographic bucket did you visit sites about guns, cars and girls or Disney, toys, and motherhood.

Web bugs and cookies Can be merged and even synchronized with a person’s e-mail address. Issues may Positive Negative Illegal Unethical

Cookie Contents rumors cookies could Rejected: scan information off your hard drive collect details about you passwords, credit card numbers, a list of SW on your computer. Rejected: a cookie is not an executable program can do nothing directly to your computer. small, unique text files created by a Web site and sent to a computer’s hard drive.

Cookie Contents Contain: a name, a value, an expiration date, and the originating site. The header contains this information removed from the document before the browser displays it. Cant be viewed : even if you execute the view or document source commands in your browser. is part of the cookie when it is created: When it is put on your hard drive, the header is left off. The only information left of the cookie is relevant to the server and no one else.

Cookie Contents Header: example Set-Cookie: NAME=VALUE; expires=DATE; path=PATH; domain=DOMAIN_NAME; secure

Cookie Contents The NAME=VALUE: DATE DOMAIN_NAME PATH Secure is required. NAME is the name of the cookie. VALUE has no relevance to the user; it is anything the origin server chooses to send. DATE determines how long the cookie will be on your hard drive. No expiration date indicates that the cookie will expire when you quit the Web browser. DOMAIN_NAME contains the address of the server that sent the cookie and that will receive a copy of this cookie when the browser requests a file from that server. It specifies the domain for which the cookie is valid. PATH used to further define when a cookie is sent back to a server. Secure specifies that the cookie only be sent if a secure channel is being used.

Where it is store Netscape Navigator users Explorer users C:/Program Files/ Netscape/Users/default or user name/cookie.txt) Explorer users C:\Documents and Settings\<user-name\Cookies

Delete, disallowed & block Web browsers have options that alert users before accepting cookies. there is software that allows users to block cookies, Get one and report

Reading ASS ??Cookie Poisoning

Cookies creation Cookies are stored as a text string scripting to a cookie can be manipulated like any other string literal scripting to set the cookie allow the trouble-free flow of information back and forth between the server and client. languages Perl CGI script ( common). JavaScript, Livewire, ASP, or VBScript

Cookies creation Here is an example of a JavaScript cookie: <SCRIPT language=JavaScript> function setCookie (name, value, expires, path, domain, secure) { document.cookie = name + “=“ + escape(value) + ((expires) ? “; expires=“ + expires : ““) + ((path) ? “; path=“ + path : ““) + ((domain) ? “; domain=“ + domain : ““) + ((secure) ? “; secure” : ““); } </SCRIPT>.

Cookie Creation cookie is written in a different languages the content includes the same name-value pairs. Each is used to set and retrieve only their unique cookie and they are very similar in content. The choice of which one to use is up to the creators’ personal preference and knowledge

View the cookie to see from the file is very limited and not easily readable. is only readable in its entirety by the server that set the cookie. what you see looks mostly like indecipherable numbers or computer noise. cookie viewer program - Winmag.com free program locate and display all of the cookies on “Windows “ computer.

Do you think there are positive things about Cookies? Reading Ass Do you think there are positive things about Cookies?

Negative Issues Regarding Cookies security and privacy issues Are cookies a security risk? Are cookies ethical? is based on how the information about users is collected, what information is collected, how this information is used. information such as service provider, OS , browser type, monitor specifications, CPU type, IP address, and what server last logged on. shared Computer at an Internet café people can snoop into the last user’s cookie file

Negative Issues Regarding Cookies things that cookies cannot do: Steal or damage information from a user’s hard drive Plant viruses that would destroy the hard drive Track movements from one site to another site Take credit card numbers without permission Travel with the user to another computer Track down names, addresses, and other information unless consumers have provided such information voluntarily

Negative Issues Regarding Cookies personalization On January 27, 2000 a California woman filed suit against DoubleClick accusing the Web advertising firm of unlawfully obtaining and selling consumers’ private information. The lawsuit alleges that DoubleClick employs sophisticated computer tracking technology, known as cookies, to identify Internet users and collect personal information without their consent as they travel around the Web. In June 2000 DoubleClick purchased Abacus Direct Corporation a direct marketing service that maintains a database of names, addresses, and the retail purchasing habits of 90 percent of American households.

Negative Issues Regarding Cookies DoubleClick’s new privacy policy states that the company plans to use the information collected by cookies to build a database profiling consumers. defends the practice of profiling, insisting that it allows better targeting of online ads which in turn makes the customer’s online experiences more relevant and advertising more profitable. The company calls it “personalization.”

Negative Issues Regarding Cookies GOOD policy: “Companies must tell consumers they’re collecting personal information, let them know what will be done with it and give them an opportunity to opt out, or block collection of their data.”

What Is a Web Bug? A Web bug is a graphic (1X1) To monitor on a Web page or in an e-mail message To monitor who is reading the Web page or an e-mail msg.

call-back to the server What Is a Web Bug? Like cookie electronic tags help Web sites and advertisers track visitors’ whereabouts in cyberspace. call-back to the server

What Is a Web Bug? check for bugs Search the page source code for an IMG tag attributes WIDTH=1 HEIGHT=1 BORDER=0 it is quite likely a Web bug. http:www.investorplace.com. <IMG SRC=“http:ad.doubleclick.net/activity;src=328142; type=mmti; cat=invstr;ord=<Time>?”WIDTH=1 HEIGHT=1 BORDER=0>

Privacy and Other Web Bug Issues Directed Advertising - Advertising networks DoubleClick or Match Point Use Web bugs = “Internet tags” to develop an “independent accounting” of the number of people in various regions of the world, as well as various regions of the Internet, who have accessed a particular Web site.

Privacy and Other Web Bug Issues Account for the statistical page views within the Web sites. helpful in planning and managing the effectiveness of the content because it provides a survey of target market information (i.e., the number of visits by users to the site). use Web bugs to build a personal profile of sites a person has visited. This information can be warehoused on a database server and mined to determine what types of ads are to be shown to that user.

Privacy and Other Web Bug Issues Web bugs used in e-mail messages more invasive

Privacy and Other Web Bug Issues In Web-based e-mail Web bugs can be used to Determine if and when an e-mail message has been read. provide the IP address of the recipient whether or not the recipient wishes that information disclosed.

Privacy and Other Web Bug Issues Within an organization a Web bug can give an idea: of how often a message is being forwarded and read. helpful in direct marketing to return statistics on the effectiveness of an ad campaign. be used to detect if someone has viewed a junk e-mail message or not. People who do not view a message can be removed from the list for future mailings

Privacy and Other Web Bug Issues With the help of a cookie the Web bug can Identify a machine, the Web page it opened, the time the visit began, and other details. sent to : a company that provides advertising services. used to: determine if someone subsequently visits another company page in the same ad network to buy something or to read other material.

Privacy and Other Web Bug Issues for consumer Web bugs and other tracking tools represent a growing threat to the privacy and autonomy of online computer users.

Privacy and Other Web Bug Issues Web bugs and Microsoft Word documents It is also possible to add Web bugs to Microsoft Word documents. A Web bug could allow an author to to track where a document is being read. watch how a document is passed from one person to another or from one organization to another.

Privacy and Other Web Bug Issues Some possible uses of Web bugs in Word documents include: Detecting and tracking leaks of confidential documents from a company Tracking possible copyright infringement of newsletters and reports Monitoring the distribution of a press release Tracking the quoting of text when it is copied from one Word document to a new document

Privacy and Other Web Bug Issues Web bugs are made possible by the ability in Microsoft Word for a document to link to an image file that is located on a remote Web server.

Privacy and Other Web Bug Issues URL of the Web bug is stored in a document and not the actual image Microsoft Word must fetch the image from a Web server each and every time the document is opened. This image-linking feature then puts a remote server in the position to monitor when and where a document file is being opened. The server knows the IP address and host name of the computer that is opening the document. host name will typically include the company name of a business. has the name of a user’s ISP

Privacy and Other Web Bug Issues Web bugs can be used in Word documents Excel 2000 PowerPoint 2000

ASS how to removing the feature of including the bug’s linking to in Microsoft Documents?

Synchronization of Web Bugs and Cookies synchronized to a particular e-mail address

Synchronization of Web Bugs and Cookies This trick allows a Web site to know the identity of people plus other personal information about them who come to the site at a later date

Synchronization of Web Bugs and Cookies if two separate sites place a separate unique cookie on your computer they cannot read the data stored in each other’s cookies. if the cookie placed on your computer contains information that is sent by that site to an advertising agency’s server and that agency is used by both Web sites.

Synchronization of Web Bugs and Cookies If each of these sites Places a Web bug on its page: to report information back to the advertising agency’s computer every time you visit either site details about you will be sent back to the advertising agency utilizing information stored on your computer relative to both sets of cookie files. This allows your computer to be identified as a computer that visited each of the sites.

example When Bob (the Web surfer) loads a page or opens an e-mail that contains a Web bug, information is sent to the server housing the “transparent GIF.” Common information being sent includes the IP address of Bob’s computer, his type of browser, the URL of the Web page being viewed, the URL of the image, and the time the file was accessed. Also potentially being sent to the server the thing that could be most threatening to Bob’s privacy, is a previously set cookie value, found on his computer.

Depending on the nature of the preexisting cookie example Depending on the nature of the preexisting cookie it could contain a whole host of information from usernames and passwords to e-mail addresses and credit card information.

example Bob may receive Then the two Web sites a cookie another cookie upon visiting Web Site #1 that contains a transparent GIF is hosted on a specific advertising agency’s server. another cookie when he goes to Web Site #2 that contains a transparent GIF is hosted on the same advertising agency’s server. Then the two Web sites would be able to cross-reference Bob’s activity through the cookies that are reporting to the advertiser.

example As this activity continues the advertiser is able to stockpile what is considered to be non-personal information on Bob’s preferences and habits there is the potential for the aggregation of Bob’s personal information

Synchronization of Web Bugs and Cookies Technically possible different servers could synchronize their cookies and Web bugs enabling this information to be shared across the World Wide Web. If this were to happen just the fact that a person visited a certain Web site could be spread throughout many Internet servers, and the invasion of one’s privacy could be endless.

Reading and reporting Page 3016: 224.3 Tracking Web Sites Visited

LAB Create two sites with cookie and bugs technologies to cross a reference to the visitors of both through a third party server. Creating a profile for each visitor