The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

Online Privacy A Module of the CYC Course – Personal Security
How to protect yourself, your computer, and others on the internet
Working with the Internet
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
INTERNET SAFETY FOR STUDENTS
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Netiquette Rules.
$200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $500 $100 Category One Category Two Category.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Computer Networks. Types of Wireless Network Attacks - 1 Insertion attacks: When a wireless device connects to an access point without authorization Interception.
ONLINE SHOPPING BY ROMIL SOMAIYA FOR CLASH GROUP community LEICESTER ARTHERITIS SELF HELP ©
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
The Internet & The World Wide Web Notes
INTERNET SAFETY FOR STUDENTS
The Internet & Web Browsers Business Webpage Design Kelly Seale.
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
Internet safety By Lydia Snowden.
1 Computer & Web Security  Security Problems in Computer Use  Privacy-Protecting Techniques  Privacy-Protecting Technologies: cryptography, digital.
Copyright © Texas Education Agency, All rights reserved.1 Web Technologies Web Administration.
 Internet vs WWW  Pages vs Sites  How the Internet Works  Getting a Web Presence.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Unit 19 INTERNET SECURITY
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Internet Information ISYS 105B. What is the Internet? Comprised of network of computers Started in 1969 by U.S. Defense Dept.
HOW ACCESS TO WWW Student Name : Hussein Alkhaldi.
Staying Safe Online Keep your Information Secure.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Reliability & Desirability of Data
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
COOKIES. INTERNET COOKIES What are they Where are they found What should you do about them.
Types of Electronic Infection
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Your Name Your Class.  Is a network of networks  Began in 1969 as ARPANET (Advanced Research Projects Agency Network)  No central authority and thus.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Society & Computers PowerPoint
science/internet-intro
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Internet Concept of protocols INTERNET Internet Service Provider (ISP) has connected to the Internet.
The Internet. Important Terms Network Network Internet Internet WWW (World Wide Web) WWW (World Wide Web) Web page Web page Web site Web site Browser.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Secure Transactions Chapter 17. The user's machine No control over security of user's machine –Might be in very insecure: library, school, &c. Users disable.
Any criminal action perpetrated primarily through the use of a computer.
URLs & Web Protocols 18 URLs & Web Protocols 18. URLs & Web Protocols 18 A URL is a web address Uniform Resource Locator You say it like ‘earl’ A resource.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Tonga Institute of Higher Education IT 141: Information Systems
Unit 4 IT Security.
COOKIES.
Virtual Private Networks
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
Web Servers (IIS and Apache)
Presentation transcript:

The World-Wide Web

Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal info was released to the Internet each time you view a Web page? How secure your personal (credit card) info is moved from your browser to the Web server? How secure your personal (credit card) info is moved from your browser to the Web server?

How info is transmitted? Uniform Resource Locator (URL) Uniform Resource Locator (URL) Hypertext Transfer Protocol Domain name of the Web server Directory path Web page

How info is transmitted? Forms using the GET method Forms using the GET method –Your shipping address –In the webpage, <FORM … METHOD=“GET” … –Your address is displayed publicly –Anyone over your shoulder can read it –Since using the GET method is determined by the Web server, there is nothing you can do to avoid it

How info is transmitted? Forms using the POST method Forms using the POST method –Your shipping address –In the webpage, <FORM … METHOD=“POST” … –Your address is NOT displayed publicly –This does NOT mean it is safe.

What info is transmitted? Each time you access the Web, the browser sends the following to the Web server Each time you access the Web, the browser sends the following to the Web server –The IP address of your machine Often it can identify your town or ISP Often it can identify your town or ISP –The web server’s IP address –The OS you use on your machine –The browser you use Goto Goto to see how much info is sent to the Web server

What are Cookies? Have you ever gone to a website that seemed to remember you? Have you ever gone to a website that seemed to remember you? Websites use cookies to store info about you on your own computer Websites use cookies to store info about you on your own computer –When you visit such a website, it stores info as cookies (that appear as files) on your computer –Next you visit the same website, your browser sends over all the cookies stored by that website What info is stored in cookies? What info is stored in cookies? –In theory, anything the website wants to –Normally, it is about how you used the website –A website could store your id, password, etc in cookies if it has that info.

What are Cookies? The positive side of cookies The positive side of cookies –A Web server can use cookies to streamline and personalize your interactions with it –A browser is supposed to send cookies only to the Web server who stored them. The negative side of cookies The negative side of cookies –Companies may use cookies to store info for other purposes without your permission –There are ways for a Web server to get cookies that were stored by other Web servers.

What defenses against Cookies For the website you visit, especially, those websites you need to register, check: For the website you visit, especially, those websites you need to register, check: –How will the company use the info you supply? –Will the company share info with others? –Can you limit access of other to this info? –What protections are in place to keep this info?

What defenses against Cookies If you use a computer at work or school, cookies would be stored on school or company’s computer: If you use a computer at work or school, cookies would be stored on school or company’s computer: –System administrators or managers may read your cookies files View your organization’s privacy policy View your organization’s privacy policy –Technicians may inadvertently access your cookies, when your computer was sent for repair, for example. –Best way to protect yourself, delete cookies. Almost every browser has a function you can use to delete cookies. Almost every browser has a function you can use to delete cookies.

How secure is info during transmission When you use the Internet, all data you put on the network is visible to computers on the same Ethernet, as discussed in the Network chapter. When you use the Internet, all data you put on the network is visible to computers on the same Ethernet, as discussed in the Network chapter. When your data need to be passed from one segment to another segment of the network, the intermediate computers can read your data. When your data need to be passed from one segment to another segment of the network, the intermediate computers can read your data. Thus, info is not secure at all when transmitted on the Internet. Thus, info is not secure at all when transmitted on the Internet.

How secure is info during transmission One way to protect yourself is encrypt info that you want to be confidential One way to protect yourself is encrypt info that you want to be confidential –When data is encrypted, it can still be copied or intercepted by other computers, however, they would not know what it means. –When a good encryption is used, it may take years, decades to break the code When shopping (or passing private info) on the Web, make sure the website uses HTTPS protocol. When shopping (or passing private info) on the Web, make sure the website uses HTTPS protocol. –HTTPS: Secure HTTP, which asks the browser to encrypt the data before it is transmitted and the server decrypts data upon receiving.

How can one get credit card # online? If you don’t use encryption when you send your credit card number (via , or the Web) on the Internet, someone may intercept the data and get the card number. If you don’t use encryption when you send your credit card number (via , or the Web) on the Internet, someone may intercept the data and get the card number. –Encrypt your and use HTTPS Someone may install a keyboard sniffer, a spyware, to record every key stroke, and the sniffer sends credit card # to an accomplice site. Someone may install a keyboard sniffer, a spyware, to record every key stroke, and the sniffer sends credit card # to an accomplice site. –Remove spyware from your computer Credit card companies and companies that have your credit card info may not have that info securely protected. Hackers may steal info from those companies’ computers. Credit card companies and companies that have your credit card info may not have that info securely protected. Hackers may steal info from those companies’ computers.

How can online companies defraud me? If the online company (a website) is not a real company or it engages in unethical practices, you may be charged but never receive the merchandise or overcharged. If the online company (a website) is not a real company or it engages in unethical practices, you may be charged but never receive the merchandise or overcharged. It is very hard to recover the charges over the Internet. It is very hard to recover the charges over the Internet. To protect yourself, only deal with companies with well-established reputation, like amazon.com, etc. To protect yourself, only deal with companies with well-established reputation, like amazon.com, etc.

Terminology Cookies Cookies Decryption Decryption Encryption Encryption Form Form Secure HTTP Secure HTTP Uniform Resource Locator (URL) Uniform Resource Locator (URL)