SlideShare une entreprise Scribd logo
1  sur  15
Online Privacy
-Have you ever been troubled by
cookies?
With the progress of online technology,
privacy issues have arouse more and more
concerns to consumer. The porblems of
strangers or third party break into personal
online information especially worth our
concern. And the majority of these concerns
are related to the issue of 'Cookies'.
For authentication
'Shopping Cart' Contents.
Users may choose
different product in
different pages within a
period of time. And the
information will be written
on Cookies, which may
help to get history at the
final payment.
Storing site
preferences
A Cookie, as known as a web
cookie, browser cookie, and
HTTP cookie, is a piece of text
stored by a user's web browser.
Cookies normally have useful functions, however, the original intention
had been ruined by some enterprises. Those enterprises have found
some ways to implaint their own cookies secretly through this process.
And then set up the detailed searching engine about consumer's own
interests, purchasing habits and lifestyles. A lot of companies sell these
kinds of informations to the third parties in order to get profit.
Different ways of invasion of online privacy by Cookies
• Cookie hijacking Cookies can be
stolen via packet sniffing in an
attack called session hijacking.
Traffic on a network can be
intercepted and read by computers
on the network other than its
sender and its receiver
(particularly on unencrypted
public Wi-Fi networks). This
traffic includes cookies sent on
ordinary unencrypted HTTP
sessions. Where network traffic is
not encrypted, malicious users can
therefore read the
communications of other users on
the network, including their
cookies, using programs called
packet sniffers.
• Cookie theft The cookie
specifications constrain cookies to
be sent back only to the servers in
the same domain as the server
from which they originate.
However, there are different ways
to steal cookies by cross-site
scripting and making the browser
itself send cookies to malicious
servers.
• Cookie poisoning While cookies
are supposed to be stored and sent
back to the server unchanged, an
attacker may modify the value of
cookies before sending them back
to the server. If, for example, a
cookie contains the total value a
user has to pay for the items in
their shopping basket, changing
this value exposes the server to
the risk of making the attacker
pay less than the supposed price.
Example for good use of Cookies
If you are looking for house renting information on
Allhomes.au, they may notice that and send you an
e-mail that contain the latest informations on that.
This kinds of network marketing is well targeted to
consumers' needs. But, the information collected
through adware or spyare have often been sold to a
third party which is not that kinds. So will you still
have a positive impression of this kinds of cookies
and softwares?
Example for bad use of Cookies
If, a cookie contains the total value a user has to pay
for the items in their shopping basket, changing this
value exposes the server to the risk of making the
attacker pay less than the supposed price.
The process of tampering with the value of cookies is
called cookie poisoning, and is sometimes used after
cookie theft to make an attack persistent.
So, we really need to pay hundred percent attention when we
conduct activities on the Internet!!!
How to protect your onlince privacy
Users can change their
browser settings to
realize prohibition of
use of Cookies.
Enterprisers who have
conscience also
provide opt-out
function to their own
website in order to
prevent their own
cookies to collect or
store the information
in the user's system.
For those who are apprehensive for been monitored. They still have a
lot of ways to protect their privacy online.
Firewall can protect
user's computer from
any attacks, and let the
users know whether
their computer
program is trying to
steal and tranfer their
personal data to the
third party.
Postscript
Cookies are only one central point of the endless
controversy over Internet privacy issues. With the adoption
of new technology, more policies and rules will be needed
to regulate the online marketing activities.
Interactive questions:
1.If you are responsible for the online
product marketing,do you want to get this
kind of information from cookies? Why or
Why not.
2.Should the network security and privacy
issues be interfered by government and
laws or by self-regulation of the
enterprises?
Reference Lists and Useful sources
• William F.Arens, 2007, Essentials of Contemporary
Advertising.
• Flew, T 2010, New Media: an introduction, 3rd edn, Oxford
University Press.
• Highly recommended: http://www.youtube.com/watch?v=XfZLztx8cKI
Thank for
listening. Hope
you enjoy my
presentation.

Contenu connexe

Similaire à Online Privacy and Cookies Explained

Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxMIsmail73
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet CookiesRitika Barethia
 
A Marketer's Ultimate Guide to Web Cookies
A Marketer's Ultimate Guide to Web CookiesA Marketer's Ultimate Guide to Web Cookies
A Marketer's Ultimate Guide to Web CookiesAdRoll
 
Presentation portfolio E-business
Presentation portfolio E-business Presentation portfolio E-business
Presentation portfolio E-business J_waut14
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief IntroductionHTS Hosting
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookiesanita gouda
 
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveyHow Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveySogolytics
 
Cookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfCookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfAdzappier
 
Greenlight digital marketing - when the digital cookie crumbles
Greenlight digital marketing - when the digital cookie crumblesGreenlight digital marketing - when the digital cookie crumbles
Greenlight digital marketing - when the digital cookie crumblesGreenlight Digital
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentationNilu Desai
 
Seers Cookie Consent.pdf
Seers Cookie Consent.pdfSeers Cookie Consent.pdf
Seers Cookie Consent.pdfjofra4
 
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club  "Demystifying the EU Cookie Law presentation, GeldardseBusiness Club  "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club "Demystifying the EU Cookie Law presentation, GeldardsJon Egley
 
Here comes the Cookie Monster
Here comes the Cookie MonsterHere comes the Cookie Monster
Here comes the Cookie MonsterBANNER
 
Cyber Safety Cookies
Cyber Safety Cookies   Cyber Safety Cookies
Cyber Safety Cookies itmadesimple
 

Similaire à Online Privacy and Cookies Explained (20)

Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptx
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet Cookies
 
A Marketer's Ultimate Guide to Web Cookies
A Marketer's Ultimate Guide to Web CookiesA Marketer's Ultimate Guide to Web Cookies
A Marketer's Ultimate Guide to Web Cookies
 
Presentation portfolio E-business
Presentation portfolio E-business Presentation portfolio E-business
Presentation portfolio E-business
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
 
GDPR Cookies Policy
GDPR Cookies PolicyGDPR Cookies Policy
GDPR Cookies Policy
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookies
 
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveyHow Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
 
Cookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfCookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdf
 
Greenlight digital marketing - when the digital cookie crumbles
Greenlight digital marketing - when the digital cookie crumblesGreenlight digital marketing - when the digital cookie crumbles
Greenlight digital marketing - when the digital cookie crumbles
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentation
 
Seers Cookie Consent.pdf
Seers Cookie Consent.pdfSeers Cookie Consent.pdf
Seers Cookie Consent.pdf
 
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club  "Demystifying the EU Cookie Law presentation, GeldardseBusiness Club  "Demystifying the EU Cookie Law presentation, Geldards
eBusiness Club "Demystifying the EU Cookie Law presentation, Geldards
 
Cookies and European Union Law
Cookies and European Union LawCookies and European Union Law
Cookies and European Union Law
 
Cookies
CookiesCookies
Cookies
 
Here comes the Cookie Monster
Here comes the Cookie MonsterHere comes the Cookie Monster
Here comes the Cookie Monster
 
Cookies Update
Cookies UpdateCookies Update
Cookies Update
 
4 ps cookies
4 ps cookies4 ps cookies
4 ps cookies
 
Cyber Safety Cookies
Cyber Safety Cookies   Cyber Safety Cookies
Cyber Safety Cookies
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
 

Dernier

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Online Privacy and Cookies Explained

  • 1. Online Privacy -Have you ever been troubled by cookies?
  • 2. With the progress of online technology, privacy issues have arouse more and more concerns to consumer. The porblems of strangers or third party break into personal online information especially worth our concern. And the majority of these concerns are related to the issue of 'Cookies'.
  • 3. For authentication 'Shopping Cart' Contents. Users may choose different product in different pages within a period of time. And the information will be written on Cookies, which may help to get history at the final payment. Storing site preferences A Cookie, as known as a web cookie, browser cookie, and HTTP cookie, is a piece of text stored by a user's web browser.
  • 4. Cookies normally have useful functions, however, the original intention had been ruined by some enterprises. Those enterprises have found some ways to implaint their own cookies secretly through this process. And then set up the detailed searching engine about consumer's own interests, purchasing habits and lifestyles. A lot of companies sell these kinds of informations to the third parties in order to get profit.
  • 5. Different ways of invasion of online privacy by Cookies • Cookie hijacking Cookies can be stolen via packet sniffing in an attack called session hijacking. Traffic on a network can be intercepted and read by computers on the network other than its sender and its receiver (particularly on unencrypted public Wi-Fi networks). This traffic includes cookies sent on ordinary unencrypted HTTP sessions. Where network traffic is not encrypted, malicious users can therefore read the communications of other users on the network, including their cookies, using programs called packet sniffers.
  • 6. • Cookie theft The cookie specifications constrain cookies to be sent back only to the servers in the same domain as the server from which they originate. However, there are different ways to steal cookies by cross-site scripting and making the browser itself send cookies to malicious servers.
  • 7. • Cookie poisoning While cookies are supposed to be stored and sent back to the server unchanged, an attacker may modify the value of cookies before sending them back to the server. If, for example, a cookie contains the total value a user has to pay for the items in their shopping basket, changing this value exposes the server to the risk of making the attacker pay less than the supposed price.
  • 8. Example for good use of Cookies If you are looking for house renting information on Allhomes.au, they may notice that and send you an e-mail that contain the latest informations on that. This kinds of network marketing is well targeted to consumers' needs. But, the information collected through adware or spyare have often been sold to a third party which is not that kinds. So will you still have a positive impression of this kinds of cookies and softwares?
  • 9. Example for bad use of Cookies If, a cookie contains the total value a user has to pay for the items in their shopping basket, changing this value exposes the server to the risk of making the attacker pay less than the supposed price. The process of tampering with the value of cookies is called cookie poisoning, and is sometimes used after cookie theft to make an attack persistent.
  • 10. So, we really need to pay hundred percent attention when we conduct activities on the Internet!!!
  • 11. How to protect your onlince privacy Users can change their browser settings to realize prohibition of use of Cookies. Enterprisers who have conscience also provide opt-out function to their own website in order to prevent their own cookies to collect or store the information in the user's system. For those who are apprehensive for been monitored. They still have a lot of ways to protect their privacy online. Firewall can protect user's computer from any attacks, and let the users know whether their computer program is trying to steal and tranfer their personal data to the third party.
  • 12. Postscript Cookies are only one central point of the endless controversy over Internet privacy issues. With the adoption of new technology, more policies and rules will be needed to regulate the online marketing activities.
  • 13. Interactive questions: 1.If you are responsible for the online product marketing,do you want to get this kind of information from cookies? Why or Why not. 2.Should the network security and privacy issues be interfered by government and laws or by self-regulation of the enterprises?
  • 14. Reference Lists and Useful sources • William F.Arens, 2007, Essentials of Contemporary Advertising. • Flew, T 2010, New Media: an introduction, 3rd edn, Oxford University Press. • Highly recommended: http://www.youtube.com/watch?v=XfZLztx8cKI
  • 15. Thank for listening. Hope you enjoy my presentation.