SlideShare uma empresa Scribd logo
1 de 15
Online Privacy
-Have you ever been troubled by
cookies?
With the progress of online technology,
privacy issues have arouse more and more
concerns to consumer. The porblems of
strangers or third party break into personal
online information especially worth our
concern. And the majority of these concerns
are related to the issue of 'Cookies'.
For authentication
'Shopping Cart' Contents.
Users may choose
different product in
different pages within a
period of time. And the
information will be written
on Cookies, which may
help to get history at the
final payment.
Storing site
preferences
A Cookie, as known as a web
cookie, browser cookie, and
HTTP cookie, is a piece of text
stored by a user's web browser.
Cookies normally have useful functions, however, the original intention
had been ruined by some enterprises. Those enterprises have found
some ways to implaint their own cookies secretly through this process.
And then set up the detailed searching engine about consumer's own
interests, purchasing habits and lifestyles. A lot of companies sell these
kinds of informations to the third parties in order to get profit.
Different ways of invasion of online privacy by Cookies
• Cookie hijacking Cookies can be
stolen via packet sniffing in an
attack called session hijacking.
Traffic on a network can be
intercepted and read by computers
on the network other than its
sender and its receiver
(particularly on unencrypted
public Wi-Fi networks). This
traffic includes cookies sent on
ordinary unencrypted HTTP
sessions. Where network traffic is
not encrypted, malicious users can
therefore read the
communications of other users on
the network, including their
cookies, using programs called
packet sniffers.
• Cookie theft The cookie
specifications constrain cookies to
be sent back only to the servers in
the same domain as the server
from which they originate.
However, there are different ways
to steal cookies by cross-site
scripting and making the browser
itself send cookies to malicious
servers.
• Cookie poisoning While cookies
are supposed to be stored and sent
back to the server unchanged, an
attacker may modify the value of
cookies before sending them back
to the server. If, for example, a
cookie contains the total value a
user has to pay for the items in
their shopping basket, changing
this value exposes the server to
the risk of making the attacker
pay less than the supposed price.
Example for good use of Cookies
If you are looking for house renting information on
Allhomes.au, they may notice that and send you an
e-mail that contain the latest informations on that.
This kinds of network marketing is well targeted to
consumers' needs. But, the information collected
through adware or spyare have often been sold to a
third party which is not that kinds. So will you still
have a positive impression of this kinds of cookies
and softwares?
Example for bad use of Cookies
If, a cookie contains the total value a user has to pay
for the items in their shopping basket, changing this
value exposes the server to the risk of making the
attacker pay less than the supposed price.
The process of tampering with the value of cookies is
called cookie poisoning, and is sometimes used after
cookie theft to make an attack persistent.
So, we really need to pay hundred percent attention when we
conduct activities on the Internet!!!
How to protect your onlince privacy
Users can change their
browser settings to
realize prohibition of
use of Cookies.
Enterprisers who have
conscience also
provide opt-out
function to their own
website in order to
prevent their own
cookies to collect or
store the information
in the user's system.
For those who are apprehensive for been monitored. They still have a
lot of ways to protect their privacy online.
Firewall can protect
user's computer from
any attacks, and let the
users know whether
their computer
program is trying to
steal and tranfer their
personal data to the
third party.
Postscript
Cookies are only one central point of the endless
controversy over Internet privacy issues. With the adoption
of new technology, more policies and rules will be needed
to regulate the online marketing activities.
Interactive questions:
1.If you are responsible for the online
product marketing,do you want to get this
kind of information from cookies? Why or
Why not.
2.Should the network security and privacy
issues be interfered by government and
laws or by self-regulation of the
enterprises?
Reference Lists and Useful sources
• William F.Arens, 2007, Essentials of Contemporary
Advertising.
• Flew, T 2010, New Media: an introduction, 3rd edn, Oxford
University Press.
• Highly recommended: http://www.youtube.com/watch?v=XfZLztx8cKI
Thank for
listening. Hope
you enjoy my
presentation.

Mais conteúdo relacionado

Semelhante a Online Privacy and Cookies Explained

Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxMIsmail73
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet CookiesRitika Barethia
 
A Marketer's Ultimate Guide to Web Cookies
A Marketer's Ultimate Guide to Web CookiesA Marketer's Ultimate Guide to Web Cookies
A Marketer's Ultimate Guide to Web CookiesAdRoll
 
Presentation portfolio E-business
Presentation portfolio E-business Presentation portfolio E-business
Presentation portfolio E-business J_waut14
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief IntroductionHTS Hosting
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookiesanita gouda
 
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveyHow Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveySogolytics
 
Cookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfCookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfAdzappier
 
Greenlight digital marketing - when the digital cookie crumbles
Greenlight digital marketing - when the digital cookie crumblesGreenlight digital marketing - when the digital cookie crumbles
Greenlight digital marketing - when the digital cookie crumblesGreenlight Digital
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentationNilu Desai
 
Seers Cookie Consent.pdf
Seers Cookie Consent.pdfSeers Cookie Consent.pdf
Seers Cookie Consent.pdfjofra4
 
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club  "Demystifying the EU Cookie Law presentation, GeldardseBusiness Club  "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club "Demystifying the EU Cookie Law presentation, GeldardsJon Egley
 
Here comes the Cookie Monster
Here comes the Cookie MonsterHere comes the Cookie Monster
Here comes the Cookie MonsterBANNER
 
Cyber Safety Cookies
Cyber Safety Cookies   Cyber Safety Cookies
Cyber Safety Cookies itmadesimple
 

Semelhante a Online Privacy and Cookies Explained (20)

Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptx
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet Cookies
 
A Marketer's Ultimate Guide to Web Cookies
A Marketer's Ultimate Guide to Web CookiesA Marketer's Ultimate Guide to Web Cookies
A Marketer's Ultimate Guide to Web Cookies
 
Presentation portfolio E-business
Presentation portfolio E-business Presentation portfolio E-business
Presentation portfolio E-business
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
 
GDPR Cookies Policy
GDPR Cookies PolicyGDPR Cookies Policy
GDPR Cookies Policy
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookies
 
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveyHow Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
 
Cookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfCookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdf
 
Greenlight digital marketing - when the digital cookie crumbles
Greenlight digital marketing - when the digital cookie crumblesGreenlight digital marketing - when the digital cookie crumbles
Greenlight digital marketing - when the digital cookie crumbles
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentation
 
Seers Cookie Consent.pdf
Seers Cookie Consent.pdfSeers Cookie Consent.pdf
Seers Cookie Consent.pdf
 
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club  "Demystifying the EU Cookie Law presentation, GeldardseBusiness Club  "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
 
Cookies and European Union Law
Cookies and European Union LawCookies and European Union Law
Cookies and European Union Law
 
Cookies
CookiesCookies
Cookies
 
Here comes the Cookie Monster
Here comes the Cookie MonsterHere comes the Cookie Monster
Here comes the Cookie Monster
 
4 ps cookies
4 ps cookies4 ps cookies
4 ps cookies
 
Cookies Update
Cookies UpdateCookies Update
Cookies Update
 
Cyber Safety Cookies
Cyber Safety Cookies   Cyber Safety Cookies
Cyber Safety Cookies
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
 

Último

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Último (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Online Privacy and Cookies Explained

  • 1. Online Privacy -Have you ever been troubled by cookies?
  • 2. With the progress of online technology, privacy issues have arouse more and more concerns to consumer. The porblems of strangers or third party break into personal online information especially worth our concern. And the majority of these concerns are related to the issue of 'Cookies'.
  • 3. For authentication 'Shopping Cart' Contents. Users may choose different product in different pages within a period of time. And the information will be written on Cookies, which may help to get history at the final payment. Storing site preferences A Cookie, as known as a web cookie, browser cookie, and HTTP cookie, is a piece of text stored by a user's web browser.
  • 4. Cookies normally have useful functions, however, the original intention had been ruined by some enterprises. Those enterprises have found some ways to implaint their own cookies secretly through this process. And then set up the detailed searching engine about consumer's own interests, purchasing habits and lifestyles. A lot of companies sell these kinds of informations to the third parties in order to get profit.
  • 5. Different ways of invasion of online privacy by Cookies • Cookie hijacking Cookies can be stolen via packet sniffing in an attack called session hijacking. Traffic on a network can be intercepted and read by computers on the network other than its sender and its receiver (particularly on unencrypted public Wi-Fi networks). This traffic includes cookies sent on ordinary unencrypted HTTP sessions. Where network traffic is not encrypted, malicious users can therefore read the communications of other users on the network, including their cookies, using programs called packet sniffers.
  • 6. • Cookie theft The cookie specifications constrain cookies to be sent back only to the servers in the same domain as the server from which they originate. However, there are different ways to steal cookies by cross-site scripting and making the browser itself send cookies to malicious servers.
  • 7. • Cookie poisoning While cookies are supposed to be stored and sent back to the server unchanged, an attacker may modify the value of cookies before sending them back to the server. If, for example, a cookie contains the total value a user has to pay for the items in their shopping basket, changing this value exposes the server to the risk of making the attacker pay less than the supposed price.
  • 8. Example for good use of Cookies If you are looking for house renting information on Allhomes.au, they may notice that and send you an e-mail that contain the latest informations on that. This kinds of network marketing is well targeted to consumers' needs. But, the information collected through adware or spyare have often been sold to a third party which is not that kinds. So will you still have a positive impression of this kinds of cookies and softwares?
  • 9. Example for bad use of Cookies If, a cookie contains the total value a user has to pay for the items in their shopping basket, changing this value exposes the server to the risk of making the attacker pay less than the supposed price. The process of tampering with the value of cookies is called cookie poisoning, and is sometimes used after cookie theft to make an attack persistent.
  • 10. So, we really need to pay hundred percent attention when we conduct activities on the Internet!!!
  • 11. How to protect your onlince privacy Users can change their browser settings to realize prohibition of use of Cookies. Enterprisers who have conscience also provide opt-out function to their own website in order to prevent their own cookies to collect or store the information in the user's system. For those who are apprehensive for been monitored. They still have a lot of ways to protect their privacy online. Firewall can protect user's computer from any attacks, and let the users know whether their computer program is trying to steal and tranfer their personal data to the third party.
  • 12. Postscript Cookies are only one central point of the endless controversy over Internet privacy issues. With the adoption of new technology, more policies and rules will be needed to regulate the online marketing activities.
  • 13. Interactive questions: 1.If you are responsible for the online product marketing,do you want to get this kind of information from cookies? Why or Why not. 2.Should the network security and privacy issues be interfered by government and laws or by self-regulation of the enterprises?
  • 14. Reference Lists and Useful sources • William F.Arens, 2007, Essentials of Contemporary Advertising. • Flew, T 2010, New Media: an introduction, 3rd edn, Oxford University Press. • Highly recommended: http://www.youtube.com/watch?v=XfZLztx8cKI
  • 15. Thank for listening. Hope you enjoy my presentation.