Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?

Slides:



Advertisements
Similar presentations
Internet Security What you can do to protect your family.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Let’s Talk About Cyber Security
Working with the Internet
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
INTERNET SAFETY FOR STUDENTS
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Netiquette Rules.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Computer Networks. Types of Wireless Network Attacks - 1 Insertion attacks: When a wireless device connects to an access point without authorization Interception.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
INTERNET SAFETY FOR STUDENTS
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
1 Computer & Web Security  Security Problems in Computer Use  Privacy-Protecting Techniques  Privacy-Protecting Technologies: cryptography, digital.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
IT security By Tilly Gerlack.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Students on the School Computer Network Enfield High School.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
science/internet-intro
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Any criminal action perpetrated primarily through the use of a computer.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
What they are and how to protect against them
Chapter 6 Application Hardening
Unit 4 IT Security.
Web Servers / Deployment
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Chapter 12: How Private are Web Interactions?

Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal info was released to the Internet each time you view a Web page? How secure your personal (credit card) info is moved from your browser to the Web server? How secure your personal (credit card) info is moved from your browser to the Web server?

How info is transmitted? Uniform Resource Locator (URL) Uniform Resource Locator (URL) Hypertext Transfer Protocol Domain name of the Web server Directory path Web page

How info is transmitted? Forms using the GET method Forms using the GET method –Your shipping address –In the webpage, <FORM … METHOD=“GET” … –Your address is displayed publicly –Anyone over your shoulder can read it –Since using the GET method is determined by the Web server, there is nothing you can do to avoid it

How info is transmitted? Forms using the POST method Forms using the POST method –Your shipping address –In the webpage, <FORM … METHOD=“POST” … –Your address is NOT displayed publicly –This does NOT mean it is safe.

What info is transmitted? Each time you access the Web, the browser sends the following to the Web server Each time you access the Web, the browser sends the following to the Web server –The IP address of your machine Often it can identify your town or ISP Often it can identify your town or ISP –The web server’s IP address –The OS you use on your machine –The browser you use Goto Goto to see how much info is sent to the Web server

What are Cookies? Have you ever gone to a website that seemed to remember you? Have you ever gone to a website that seemed to remember you? Websites use cookies to store info about you on your own computer Websites use cookies to store info about you on your own computer –When you visit such a website, it stores info as cookies (that appear as files) on your computer –Next you visit the same website, your browser sends over all the cookies stored by that website What info is stored in cookies? What info is stored in cookies? –In theory, anything the website wants to –Normally, it is about how you used the website –A website could store your id, password, etc in cookies if it has that info.

What are Cookies? The positive side of cookies The positive side of cookies –A Web server can use cookies to streamline and personalize your interactions with it –A browser is supposed to send cookies only to the Web server who stored them. The negative side of cookies The negative side of cookies –Companies may use cookies to store info for other purposes without your permission –There are ways for a Web server to get cookies that were stored by other Web servers.

What defenses against Cookies For the website you visit, especially, those websites you need to register, check: For the website you visit, especially, those websites you need to register, check: –How will the company use the info you supply? –Will the company share info with others? –Can you limit access of other to this info? –What protections are in place to keep this info?

What defenses against Cookies If you use a computer at work or school, cookies would be stored on school or company’s computer: If you use a computer at work or school, cookies would be stored on school or company’s computer: –System administrators or managers may read your cookies files View your organization’s privacy policy View your organization’s privacy policy –Technicians may inadvertently access your cookies, when your computer was sent for repair, for example. –Best way to protect yourself, delete cookies. Almost every browser has a function you can use to delete cookies. Almost every browser has a function you can use to delete cookies.

How secure is info during transmission When you use the Internet, all data you put on the network is visible to computers on the same Ethernet, as discussed in Ch 8. When you use the Internet, all data you put on the network is visible to computers on the same Ethernet, as discussed in Ch 8. When your data need to be passed from one segment to another segment of the network, the intermediate computers can read your data. When your data need to be passed from one segment to another segment of the network, the intermediate computers can read your data. Thus, info is not secure at all when transmitted on the Internet. Thus, info is not secure at all when transmitted on the Internet.

How secure is info during transmission One way to protect yourself is encrypt info that you want to be confidential One way to protect yourself is encrypt info that you want to be confidential –When data is encrypted, it can still be copied or intercepted by other computers, however, they would not know what it means. –When a good encryption is used, it may take years, decades to break the code When shopping (or passing private info) on the Web, make sure the website uses HTTPS protocol. When shopping (or passing private info) on the Web, make sure the website uses HTTPS protocol. –HTTPS: Secure HTTP, which asks the browser to encrypt the data before it is transmitted and the server decrypts data upon receiving.

How can one get credit card # online? If you don’t use encryption when you send your credit card number (via , or the Web) on the Internet, someone may intercept the data and get the card number. If you don’t use encryption when you send your credit card number (via , or the Web) on the Internet, someone may intercept the data and get the card number. –Encrypt your and use HTTPS Someone may install a keyboard sniffer, a spyware, to record every key stroke, and the sniffer sends credit card # to an accomplice site. Someone may install a keyboard sniffer, a spyware, to record every key stroke, and the sniffer sends credit card # to an accomplice site. –Remove spyware from your computer Credit card companies and companies that have your credit card info may not have that info securely protected. Hackers may steal info from those companies’ computers. Credit card companies and companies that have your credit card info may not have that info securely protected. Hackers may steal info from those companies’ computers.

How can online companies defraud me? If the online company (a website) is not a real company or it engages in unethical practices, you may be charged but never receive the merchandise or overcharged. If the online company (a website) is not a real company or it engages in unethical practices, you may be charged but never receive the merchandise or overcharged. It is very hard to recover the charges over the Internet. It is very hard to recover the charges over the Internet. To protect yourself, only deal with companies with well-established reputation, like amazon.com, etc. To protect yourself, only deal with companies with well-established reputation, like amazon.com, etc.

How can I secure my private computer files? Install a firewall to restrict ports that can be used for Internet communications to your computer Install a firewall to restrict ports that can be used for Internet communications to your computer Require users of computer to have an account and password. Require users of computer to have an account and password. Use anti-virus software to check all incoming materials (through , ftp, webpages) for virus and spyware. Use anti-virus software to check all incoming materials (through , ftp, webpages) for virus and spyware. Carefully monitor new programs, games and other files you bring into your system. Some programs may be vulnerable to security breaches. Carefully monitor new programs, games and other files you bring into your system. Some programs may be vulnerable to security breaches. If the operating system supports file permissions, keep your private files accessible to you only. If the operating system supports file permissions, keep your private files accessible to you only.

Does keeping a computer online comprise its security? Operating systems and other programs are quite complex, and thus prone to containing errors that in turn could create vulnerability. Operating systems and other programs are quite complex, and thus prone to containing errors that in turn could create vulnerability. –Software vendors monitor their products and release updates to resolve security risks and other errors. –Thus, make sure install those updates on your computer. Configure your Windows XP to download updates from Microsoft and install them on a regularly basis. Configure your Windows XP to download updates from Microsoft and install them on a regularly basis. Use password, encryption, etc to protect your wireless network from unauthorized access. Use password, encryption, etc to protect your wireless network from unauthorized access.

Summary – chapter 12 Coming soon Coming soon

Terminology Cookies Cookies Decryption Decryption Encryption Encryption Form Form Secure HTTP Secure HTTP Uniform Resource Locator (URL) Uniform Resource Locator (URL)