Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.

Slides:



Advertisements
Similar presentations
Working with the Internet
Advertisements

Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Chapter 7 The Web and . 7 Chapter 7: The Web and 2 Chapter Contents  Section A: Web Technology  Section B: Search Engines  Section C: E-commerce.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Chapter 7: The Web and 1 The Web and Chapter 7.
Unit 12 Using the Internet & Browsing the Web.  Understand the difference between the Internet and the World Wide Web  Identify items on a web page.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Electronic Transaction Security (E-Commerce)
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Copyright © 2004 Pearson Education, Inc. Slide 7-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Extras Plus! Pepper. Objectives extra knowledge Cookies Picture handling when creating site.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
How It Applies In A Virtual World
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Computer Concepts 2014 Chapter 7 The Web and .
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Chapter 7 The Web and 1.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
COOKIES. INTERNET COOKIES What are they Where are they found What should you do about them.
WEB security From COOKIES to Packet Sniffers – What Is This Stuff Anyway and Why Should I Care.
Protecting Students on the School Computer Network Enfield High School.
CSC 8560Fall 2000 Computer NetworksBhargavi Balasubramanian & Bob Viola Project 1 Description: E-Commerce Objective:Build a web storefront to sell videos.
Cookies and Sessions IDIA 618 Fall 2014 Bridget M. Blodgett.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
ECMM6018 Enterprise Networking for Electronic Commerce Tutorial 7
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Restoring Privacy, Cleaning Your Computer's Cookies and Beacons.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computer Concepts 2013 Chapter 7 The Web and .
Sessions and cookies (part 2) MIS 3501, Fall 2015 Brad N Greenwood, PhD Department of MIS Fox School of Business Temple University 11/19/2015.
Any criminal action perpetrated primarily through the use of a computer.
Computer Concepts 2014 Chapter 7 The Web and .
Chapter 1: Internet Marketing Foundations. Chapter Objectives Describe how computers and servers communicate to enable people to interact with webpages.
COOKIES Gloria Soria Network Security COSC 356. What is a Cookie? A cookie is a piece of text that a Web Server can store on a user's hard disk. Cookies.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
CS 115: COMPUTING FOR THE SOCIO-TECHNO WEB TECHNOLOGIES FOR PRIVATE (AND NOT-SO-PRIVATE) COMMUNICATIONS.
Windows Tutorial 5 Protecting Your Computer
Chapter 7 The Web and .
Section A: Web Technology
E-commerce Business uses of internet, e-commerce & e-business, e-marketing, e-payments etc.
Web Pages, Web Sites, and E-commerce
Unit 11 Using the Internet & Browsing the Web
Unit 12 Using the Internet & Browsing the Web
COOKIES.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
Presentation transcript:

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What is a “cookie”?  Cookie – small chunk of data generated by a Web server and stored in a text file on your computer A cookie is created by a Web server and stored on your computer’s hard disk

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 25 What is a “cookie”?  Web sites use cookies to:  Track your path through a site to keep track of the pages you viewed or the items you purchased  Provide information that allows the Web site to present you with ad banners targeted to products you previously purchased at that Web site  Collect personal information you type into a Web page form and retain any personal information that you type into a Web page form

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah Why do Web sites use cookies?  You are on your favorite online music store  You search for your favorite band, new music, listen to sample tracks  Altogether you may have viewed 2- Web pages  Each time you connect to a different page, the server regards it as a new visit  Cookies allow the music site’s server to identify you so that your request won’t be mixed up with other thousands of people visiting the same online music store  Cookies also enables the server to keep track of your activity and compile a list of your purchases

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah How do cookies work?  the cookie message can include a:  customer number  shopping cart number  part number  other data  expiration date  domain name of the host that created the cookie  a server that creates a cookie can request it the next time you connect to one its Web pages browser server your browser connects to a site that uses cookies the server sends a “set-cookie” HTTP message the cookie is saved by your browser onto your computer’s hard disk

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 26  Cookies are a relatively safe technology  Data, not computer program  cannot executed to activate worms or viruses  Can only be accessed by site that created it  Contain only information you disclose while using the site  a cookie cannot rummage through your hard drive to find passwords  BUT if you enter your credit card number during an online purchase it is possible for the cookie to store that number – same with SSN  most reputable Web sites do not store such sensitive information  Uses a customer account generated number instead of your name  your name is not associated with your cookies unless you entered it into a form, which is then transferred to a cookie Are cookies safe and private?

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 27 Does my computer have to accept cookies?

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 28  A Web programmer can program cookie to “time out”  You can delete the cookies  Firefox uses Cookies.txt or Magiccookie  IE stores each in a separate file How long do cookies stay on my computer?

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah Online Shopping

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah  Shopping cart – cyberspace version of the good old metal cart that you wheel around a store and fill up with merchandise  Shopper browses Web site, and then adds products using a “Buy” or “Add to Cart” button  Uses cookies to store information about your activities on Web site Shopping Carts: What’s an online shopping cart?

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah Shopping Carts: What’s an online shopping cart?  Add to Cart  when you click the “Add to Cart” button, the merchant’s server sends a message to your browser to add that item number (or ID number) to your cookie, which is them stored on your computer  View Cart  When you check out, the server asks your browser for all the cookie data that pertains to your chopping cart items  Cookies  Your browser sends those cookies along with a request for an order summary  Web Server  The Web server uses the cookies to produce a Web page listing the items you want to purchase

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah Is it safe to shop online?  spyware is any technology that surreptitiously gathers information  In the context of the Web and e-commerce, spyware secretly gathers information and relays it to advertisers or other interested parties  Web marketers use several spyware techniques, including ad-serving cookies and clear GIFs  Ad-serving cookies  if you click an ad, this 3 rd party can create an ad-serving cookie and use it to track your activities at any site containing banner ads from that third party  They claim that it is to simply serve you better targeted advertising  but privacy advocates worry that shopper profiles are compiled, sold, and used for unauthorized purposes  Clear GIFs  typically 1x1 pixel graphic on a Web page  can be used to set cookies to a 3 rd party Web site  You don’t even have to click a banner ad to receive the GIF-activated cookie  simply viewing the page that contains a clear GIF sets the cookie  Cookies created with clear GIFs have the same uses and potential for misuse as ad-serving cookies  ad-blocker software and anti-spyware are designed to block ad-serving cookies, clear GIFs, and other spyware – some even block banner and pop-up adverts altogether – these are becoming increasingly popular products, despite their tendency to slightly slow your browser’s response time

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah Can credit cards be intercepted?  Can credit card numbers be intercepted while traveling over the Internet?  YES  A packet sniffer (protocol analyzer) is a computer program that reads (sniffs) data packets as they travel over networks  most devices read only packets addressed to them, but packet sniffers read packets addressed to other devices  good for network administrators who have a legitimate need to observe/ open packets to their network  dangerous for hackers  Ethereal is a well-known packet sniffer software

Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah Transaction Privacy & Security  To protect your data from packet-sniffing data, you should engage in electronic transactions only over secure connection  A secure connection encrypts the data flowing between your computer and the Web server  Even if a hacker can access packets containing your payment data, it is of little use if the data is cannot be decrypted  Technologies that create secure connections include SSL and HTTPS