Restoring Privacy, Cleaning Your Computer's Cookies and Beacons.

Slides:



Advertisements
Similar presentations
The Internet and the Web
Advertisements

1 SANS Technology Institute - Candidate for Master of Science Degree 1 Assessing Privacy Risks of Flash Cookies Kevin Fuller and Stacy Jordan February.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Google Docs is a free, web-based office suite offered by Google within its Google Drive service. It was formerly a storage service as well, but has since.
Internet Browser History Presented by K. SURESH sureshsrikalahasti.weebly.com
Chapter 11 Privacy Policies and Behavioral Marketing.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
James Tam Web Browsers In this section of notes you will learn about the web browsing process, some of the important features of popular browsers and a.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
Behavior Tracking Dhaval Patel.
11-01: Get Started with SCP Supply Chain Platform Training Presentation Updated April 2009.
By: Justin Mauss Privacy vs. Convenience. Agenda Finding the Balance: Privacy vs. Convenience Revisit Privacy vs. Convenience Overview of Online Tracking.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Signature GuidelinesPage 1 Mandatory Requirements Font: Trebuchet Size: points Main Copy Color: Dark Gray (RGB 117/117/117 or # Hex)
County of Orange County of Orange Enterprise Data Center Board of Supervisors Video Dashboard Upgrade With Windows Media 9.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
P3P A New Standard in Online Privacy Overview and Demos from Summer 2000.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Digital Data Collection Training April 7, Abt Associates | pg 2 Contents Preparing Your Computer Protecting Data Entering Data Into Forms Saving.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Customer Service and Support Sutherland Global Services Consultant Learning Services Microsoft Store.
By William Cook.  How the internet works  How companies pay their bills  How to privately browse the internet.
Protecting Students on the School Computer Network Enfield High School.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Sears Privacy Policy & Security information Shaina Lacher.
MODULE 3 Internet Basics © Paradigm Publishing, Inc.1.
Safe browsing - is an ad-blocker extension enough? AIMILIOS TSOUVELEKAKIS IT-DI-CSO IT LIGHTNING TALK – 12/
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Marketing / Law / Digital Keith Arrowsmith. Court ActionPress Complaints CommissionTrading StandardsGambling Commission.
Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
City of Seattle Customized Landing Page Training All the support you need, right at your fingertips December 2014.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
The Internet & Web Browsers Business Webpage Design Created by Kelly Seale Adapted by Jill Einerson.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
Facebook privacy policy
Managing Windows Security
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
Unit 11 Using the Internet & Browsing the Web
Unit 12 Using the Internet & Browsing the Web
MICROSOFT OUTLOOK and Outlook service Provider
Internet and security.
Latest Updates on BlackHawk Mines Music : Privacy Policy
What Is Functionality Testing and How Does It Work?
BA 625: Privacy Law and Policy
Importance of Privacy Internet Safety
CS 115: COMPUTING FOR The Socio-Techno Web
Internet Basics.
Unit 27 Web Server Scripting Extended Diploma in ICT
Google Privacy Policy Karen Tao.
Privacy Issues part 4 Information/data privacy
HOW TO REGISTER FOR THE J.P. MORGAN CHASE PAYMENTNET WEBSITE
Privacy and Data Mining
Francesco Giarletta.
Personal Privacy and the Public Internet
Presentation transcript:

Restoring Privacy, Cleaning Your Computer's Cookies and Beacons

Photo by: KayVee.INC

Cookies Historical Cookies – Browsers have allowed websites to store small amounts of information on the computer. – Number of visits – Preferences – Login

Beacons/Bugs Historical 1x1 pixel transparent image Track customers across a web site Spammers use to determine valid s

What is tracked? IP address – general vicinity of your location Time you accessed the page / Computer type and operating system The browser you used Any previous information stored in cookies they stored

Turning Cookies Off Browsers allow you to turn cookies off. However, there is a downside: Many times the functionality of the website fails. For example, you may not be able to login to the site, or preferences are lost, shopping carts don’t work.

Third Party Cookies Cookies with a different domain than the site you are visiting. Quite often used in advertising to track the websites you visit.

Clearing Cookies Browsers typical allow you to clear the data stored in normal cookies. – When the cookie expires – When you close the browser – Ask before clearing

Flash Cookies Local shared objects (LSO) Latest versions of Flash do not allow 3 rd party sharing. Much larger data storage Little public awareness of LSOs Browsers are unaware of LSOs

New Information Collected Assess what you are doing on a web Determine your location Estimate your income Determine shopping interests Assess medical conditions

New Market Your profiles is built as you browse the web. Companies buy and sell your profile to target their specific ads to certain types of individuals.

Google Ad/Preference Video

iPhone / iPad 3G Track location (lat/lon) with time stamp and stored on iPhone or iPad -- Encrypt

Review ebay’s cookie policy Take a look at how ebay uses cookies and beacons web-beacons.html web-beacons.html

Discussion Is it of concern that advertisers are tracking you?

Opting Out Companies including Yahoo, Microsoft, Google and AOL will be adding links to their European ads that will allow web surfers to opt out of tracking.

Enhancing Privacy through Software Better Privacy Firefox Firefox, Safari, Chrome, IE McAfee Site Advisor Firefox Abine Privacy Suite Firefox, IE soon WOT – FF, Safari, IE, Chrome, Opera Addblock Plus Firefox, Chrome

Tips for Safe Browsing Use antivirus software Keep browser updated Update Adobe software – Flash, PDF readers Avoid clicking on malicious ads Only accept friend requests from those you know.

Removing Flash Cookies Global Storage Settings Panel entation/en/flashplayer/help/settings_manag er.html Global Storage Settings Panel entation/en/flashplayer/help/settings_manag er.html Flash announced in January they will provide a means for browsers to remove flash cookies. – So far Chrome has adopted

Disclaimer This message is the property of Time Inc. or its affiliates. It may be legally privileged and/or confidential and is intended only for the use of the addressee(s). No addressee should forward, print, copy, or otherwise reproduce this message in any manner that would allow it to be viewed by any individual not originally listed as a recipient. If the reader of this message is not the intended recipient, you are hereby notified that any unauthorized disclosure, dissemination, distribution, copying or the taking of any action in reliance on the information herein is strictly prohibited. If you have received this communication in error, please immediately notify the sender and delete this message.

Going Further WSJ article: html html

Add Ghostery/WOT to Your Browser Configure Ghostery Surf some sites and see who is tracking you