Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.

Slides:



Advertisements
Similar presentations
The Internet and the Web
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
The Internet.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
Extras Plus! Pepper. Objectives extra knowledge Cookies Picture handling when creating site.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Security Warnings TROPE: Teachers’ Resources for Online Privacy Education 1.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Best way to safeguard your personal information Made by Rita, Catherine, Annabelle,Rebecca and Nicole.
How It Applies In A Virtual World
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Unit 19 INTERNET SECURITY
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
How can you protect yourself from online identity theft?
Staying Safe Online Keep your Information Secure.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
INTERNET. BROADBAND The amount of information a connection is capable of carrying. Measured in bits per second.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
1 Lies, damn lies and Web statistics A brief introduction to using and abusing web statistics Paul Smith, ILRT July 2006.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Ad placed based on my visit to a page on Lulu.com.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
Test Your Smartitude Computer Safety. Pick a box, any box… RulesVocabularySafe or Not Safe
Internet Safety Internet Safety LPM
3.4 Internet Strand 3 Sara Liquori. 3.4 Internet  A global computer network providing a variety of information and communication facilities, consisting.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Restoring Privacy, Cleaning Your Computer's Cookies and Beacons.
Social Networking By: Ning Year 10 HC. Different types of networks  There’s so many ways people can be connected together. In person, s and social.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Web Measurement. The Web is Different from other Commuication Media More precise measurement of activity on Web sites is available More precise measurement.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
1 Privacy & Preference Committee Update Ensuring a healthy ecosystem via transparency & trust Date: January 13, 2009 Alan Chapell, President.
Identity Theft: Protect Yourself Ronald J. Leach.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
CS 115: COMPUTING FOR THE SOCIO-TECHNO WEB TECHNOLOGIES FOR PRIVATE (AND NOT-SO-PRIVATE) COMMUNICATIONS.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Hotspot Shield Protect Your Online Identity
Internet Identity, Safety, & Security
Internet and security.
Latest Updates on BlackHawk Mines Music : Privacy Policy
Importance of Privacy Internet Safety
Information Security Session October 24, 2005
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Unit 27 Web Server Scripting Extended Diploma in ICT
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Background survey Skills: none
Internet Safety – Social Media
Exploring Web Page Design
COMPUTER NETWORKS AND THE INTERNET Chapter 6
Personal Privacy and the Public Internet
Do You Have Multiple Amazon Seller Accounts? Amazon Knows it! By EsellersCare Contact : +1 (855)
Presentation transcript:

Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700

How Much Did You Tell? "Most privacy violations don't come from whopping big intrusions but from the aggregation of hundreds of small bits of knowledge, none of which individually seems important. Who cares if someone knows your ZIP code or your social security number? What about a tossed-out receipt from your ATM or an old credit card receipt? What's your mother's maiden name? But put those violations all together and you're well on your way to identity theft -- or worse." InfoWorld. March 20, 2001.

How Did You Tell? Cookies Web Bugs

How Safe Are Cookies? Cookies were intended to provide long-term “state” information, such as user ID’s or site preferences. By design, only a Web server in the domain of the server that creates a cookie can read that cookie. Internet Explorer 5.5 and 6.0 have a “backdoor” that allows any Web server to read any cookie on the user’s PC.

What’s in a Cookie? FALSE/ FALSE awMember John_Carter FALSE/ FALSE awMember gserv.zdnet.co.ukFALSE/FALSE Apache

What’s in a Cookie? FALSE/ FALSE awMember John_Carter FALSE/ FALSE awMember gserv.zdnet.co.ukFALSE/FALSE Apache

Innocent Website?

Web Bugs - Invisible Invaders

What Bugnosis Sees

What Do The Links Mean? As the “invisible” graphics are downloaded from the specified server, some minimum information is being collected about the viewer by that server: Operating System Browser Type and Version IP Address Previous Page Viewed

How Is the Information Used? The intention is to track hits on pages and your page viewing to provide targeted advertising. If you visit two sites with digital camera information, the next ads you see will relate to digital cameras and accessories.

Do You Want Them to Know Where You’ve Been? The Network Advertising Initiative has a page that provides “opt-out” from most advertising data collection:

Summary Do not reveal personal information inadvertently. Turn on cookie notices in your Web browser, and/or use cookie management software. Keep a “clean” address.

Questions? The original paper is on-line at

Thank You