Online Privacy
-Have you ever been troubled by
cookies?
With the progress of online technology,
privacy issues have arouse more and more
concerns to consumer. The porblems of
str...
For authentication
'Shopping Cart' Contents.
Users may choose
different product in
different pages within a
period of time...
Cookies normally have useful functions, however, the original intention
had been ruined by some enterprises. Those enterpr...
Different ways of invasion of online privacy by Cookies
• Cookie hijacking Cookies can be
stolen via packet sniffing in an...
• Cookie theft The cookie
specifications constrain cookies to
be sent back only to the servers in
the same domain as the s...
• Cookie poisoning While cookies
are supposed to be stored and sent
back to the server unchanged, an
attacker may modify t...
Example for good use of Cookies
If you are looking for house renting information on
Allhomes.au, they may notice that and ...
Example for bad use of Cookies
If, a cookie contains the total value a user has to pay
for the items in their shopping bas...
So, we really need to pay hundred percent attention when we
conduct activities on the Internet!!!
How to protect your onlince privacy
Users can change their
browser settings to
realize prohibition of
use of Cookies.
Ente...
Postscript
Cookies are only one central point of the endless
controversy over Internet privacy issues. With the adoption
o...
Interactive questions:
1.If you are responsible for the online
product marketing,do you want to get this
kind of informati...
Reference Lists and Useful sources
• William F.Arens, 2007, Essentials of Contemporary
Advertising.
• Flew, T 2010, New Me...
Thank for
listening. Hope
you enjoy my
presentation.
Upcoming SlideShare
Loading in...5
×

Online Privacy Eric Zhu T5

785

Published on

Aims at Online privacy, and I deliberately choose this content for u because it seems to be the most famous one and people maybe benefit from this part when they are facing the online privacy issues. Hope u guys can enjoy it.

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
785
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
19
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Online Privacy Eric Zhu T5

  1. 1. Online Privacy -Have you ever been troubled by cookies?
  2. 2. With the progress of online technology, privacy issues have arouse more and more concerns to consumer. The porblems of strangers or third party break into personal online information especially worth our concern. And the majority of these concerns are related to the issue of 'Cookies'.
  3. 3. For authentication 'Shopping Cart' Contents. Users may choose different product in different pages within a period of time. And the information will be written on Cookies, which may help to get history at the final payment. Storing site preferences A Cookie, as known as a web cookie, browser cookie, and HTTP cookie, is a piece of text stored by a user's web browser.
  4. 4. Cookies normally have useful functions, however, the original intention had been ruined by some enterprises. Those enterprises have found some ways to implaint their own cookies secretly through this process. And then set up the detailed searching engine about consumer's own interests, purchasing habits and lifestyles. A lot of companies sell these kinds of informations to the third parties in order to get profit.
  5. 5. Different ways of invasion of online privacy by Cookies • Cookie hijacking Cookies can be stolen via packet sniffing in an attack called session hijacking. Traffic on a network can be intercepted and read by computers on the network other than its sender and its receiver (particularly on unencrypted public Wi-Fi networks). This traffic includes cookies sent on ordinary unencrypted HTTP sessions. Where network traffic is not encrypted, malicious users can therefore read the communications of other users on the network, including their cookies, using programs called packet sniffers.
  6. 6. • Cookie theft The cookie specifications constrain cookies to be sent back only to the servers in the same domain as the server from which they originate. However, there are different ways to steal cookies by cross-site scripting and making the browser itself send cookies to malicious servers.
  7. 7. • Cookie poisoning While cookies are supposed to be stored and sent back to the server unchanged, an attacker may modify the value of cookies before sending them back to the server. If, for example, a cookie contains the total value a user has to pay for the items in their shopping basket, changing this value exposes the server to the risk of making the attacker pay less than the supposed price.
  8. 8. Example for good use of Cookies If you are looking for house renting information on Allhomes.au, they may notice that and send you an e-mail that contain the latest informations on that. This kinds of network marketing is well targeted to consumers' needs. But, the information collected through adware or spyare have often been sold to a third party which is not that kinds. So will you still have a positive impression of this kinds of cookies and softwares?
  9. 9. Example for bad use of Cookies If, a cookie contains the total value a user has to pay for the items in their shopping basket, changing this value exposes the server to the risk of making the attacker pay less than the supposed price. The process of tampering with the value of cookies is called cookie poisoning, and is sometimes used after cookie theft to make an attack persistent.
  10. 10. So, we really need to pay hundred percent attention when we conduct activities on the Internet!!!
  11. 11. How to protect your onlince privacy Users can change their browser settings to realize prohibition of use of Cookies. Enterprisers who have conscience also provide opt-out function to their own website in order to prevent their own cookies to collect or store the information in the user's system. For those who are apprehensive for been monitored. They still have a lot of ways to protect their privacy online. Firewall can protect user's computer from any attacks, and let the users know whether their computer program is trying to steal and tranfer their personal data to the third party.
  12. 12. Postscript Cookies are only one central point of the endless controversy over Internet privacy issues. With the adoption of new technology, more policies and rules will be needed to regulate the online marketing activities.
  13. 13. Interactive questions: 1.If you are responsible for the online product marketing,do you want to get this kind of information from cookies? Why or Why not. 2.Should the network security and privacy issues be interfered by government and laws or by self-regulation of the enterprises?
  14. 14. Reference Lists and Useful sources • William F.Arens, 2007, Essentials of Contemporary Advertising. • Flew, T 2010, New Media: an introduction, 3rd edn, Oxford University Press. • Highly recommended: http://www.youtube.com/watch?v=XfZLztx8cKI
  15. 15. Thank for listening. Hope you enjoy my presentation.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×