SlideShare una empresa de Scribd logo
1 de 12
PRIVACY THREATS  ON THE WEB MARIA SANTOS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A cookie is a  piece of information  that an Internet website  sends to your browser  when you access information at that site. Each time you use your computer to access that same website, the information that was previously received is sent back to the website by your browser.  Cookies indicate to a website that you have been there before  and can be used to record what parts of a website you visit. While cookies in themselves may not identify you,  a cookie could potentially be linked with other identifying information . If you provide extra information about yourself to the website by buying something on-line or subscribing to a free service, then the  cookies can be used to build up a profile of your buying habits and what you are interested in . There are various things you can do to combat cookies if you distrust them, these include:  Setting the browser cookie file to be Read Only  or also try one of these  software products  which will reject or manage cookies for you, like COOKIE CRUSHER, COOKIE PAL or COOKIE CRUNCHER. COOKIES
When  you access a web page from a website, the website expects you to provide certain information  so that it can provide the page you request.  The  HyperText transfer protocol (HTTP)  is the set of rules that  websites and browsers follow in order to communicate.  One obvious piece of information the website will require is what page you want to look at.  The technical term for the location of this page is the  Uniform Resource Locator (URL).  There are various aspects of HTTP which may allow  your surfing activities to be tracked . Other information which may be sent whenever you request a web page includes your  e-mail address and the last web page you looked at.  Whether this information is transmitted is dependant on whether your browser supports these options and whether you have got your browser configured with your e-mail address.  HTTP
The most  widely used browsers  are the various versions of  Netscape Navigator and Communicator and Microsoft Internet Explorer . Other less widely used browsers include Mosaic, which was one of the original browsers and Lynx which is a text based browser. There have been many reports of  security bugs in browsers  which can allow  hackers and websites  to  access your personal information  while you are surfing the web. Netscape and Microsoft often provide fixes for these bugs soon after they become aware of them, these can be downloaded from their websites. It's difficult to assess the risk to your personal information of using any particular browser, but it may be wise to keep up to date with news about security bugs BROWSERS
Governments, schools, businesses and other organizations  may have already collected personal information about you. Information collected by governments is sometimes publicly available in the form of Public Registers. The  Electoral Roll , and the  Telephone Directory are Public Registers . Your school, university or employer may publish your name or other information about you. Much personal information which is publicly available has been collected and combined into databases  by web based companies which then sell this information to businesses or individuals . Comprehensive and sometimes inaccurate profiles of individuals can be derived by combining information from many sources.  As there is little or  no law anywhere in the world governing this sort of activity  there's not much you can do about it, but at least you can be aware of it.  INFORMATION ABOUT YOU PUBLISHED ON THE WEB
There is a lot of free and cheap software available for download on the Internet. It  may be difficult to avoid using freeware and shareware  as much of this software underpins the Internet (some popular web server applications are free as are  the two most popular browsers, Netscape Navigator and Microsoft Explorer ). However, it may be prudent to  keep track of information about freeware and shareware  and only use the software that is widely used and has a good reputation.  Downloading freeware or shareware
These are web-based software tools that allow you to search for information on the Internet. Some of the  most well known ones are Google, Yahoo, Alta Vista, Hotbot, Excite, Infoseek and Web-Crawler.  Many of these offer facilities to search for people. If your name appears somewhere on the Internet then these search engines can find it. Your  name may be associated with other information  about you so it may be possible for anyone using search engines to find out quite a bit about you. Some search  engines also allow the searching of news groups for postings associated with an e-mail address.  Search Engines
ELECTRONIC COMMERCE If you buy something from a commercial web site you will probably have to use a credit card. This means  you will be transmitting your credit card number over the Internet . Currently  a widely used security system is Secure Socket Layer (SSL) which is built into the major browsers . While  SSL may provide protection during the transmission of Credit Card numbers  there are also concerns about the secure storage of Credit Card numbers.  There have been instances where hackers have stolen lists of Credit Card numbers  from ISPs and commercial web sites.  Governments and businesses are keen to encourage Electronic Commerce but there is some resistance by consumers due to concerns about security and privacy. Currently  Internet businesses seem to require you to provide more personal information  than you would for over the counter purchases. Many people are concerned that this information will then be re-used for another purpose or sold to direct marketers
How you set up your e-mail address may affect your privacy.  Like street addresses  e-mail addresses are essentially locators , but they locate you in cyberspace rather than real space.  The format of an e-mail address is A@B.C.D,  where A is your name or handle, B is usually your Internet Service Provider (ISP) or the organization you work for, C and D are called domains. The C domain may refer to your area of work or activity.. The advantage of  using a nym is that you can then only reveal your identity to who you want to know it . If you go to the trouble of using a nym you should be careful to set up your e-mail application, so that the name and identity fields are left blank. If you want to use a nym it is important to use an ISP that has disabled the Finger utility. If this is not disabled then anyone may be able to use your e-mail address to find out your name and other information about you.  E-mail
Spam is junk e-mail.  Many people who have purchased something over the Internet or have their e-mail address published on a website or have subscribed to a news service or who have participated in news groups or mailing lists, get spam. This is because these  public sources can be harvested for e-mail addresses . Some ISPs and other Internet businesses have sold lists of their customer's e-mail addresses to spammers. This is now considered to be very bad form.  Spammers have been known to use programs to randomly generate e-mail addresses .  Spam has become so prevalent that  it can compromise and slow down the whole network.  There is now a big anti-spam movement and there are various spam filters you can get to filter out and delete spam. Unfortunately, spam persists. The fact that spam is a use of your e-mail address for a purpose that you don't agree to and that you are actually paying for the delivery of the spam makes it particularly annoying.  SPAM
Chat groups have become very popular.  As they operate in real-time  they are similar to telephone party lines . Many people who participate in chat groups use nyms or handles, so  you don't really know who you are chatting with or even their gender . Some people have established relationships on chat groups which they have continued in real life. However,  it is important to note that your personal safety may be at risk,  if you meet people from chat rooms, otherwise unknown to you.  Dangers of Internet Chat

Más contenido relacionado

La actualidad más candente

Internet issues
Internet issuesInternet issues
Internet issues
CJ900
 
How to create a yahoo and hotmail accounts and how to connect to the internet
How to create a yahoo and hotmail accounts and how to connect to the internetHow to create a yahoo and hotmail accounts and how to connect to the internet
How to create a yahoo and hotmail accounts and how to connect to the internet
maria martha manette madrid
 

La actualidad más candente (20)

Team Lecture Presentation 2
Team Lecture Presentation 2Team Lecture Presentation 2
Team Lecture Presentation 2
 
Chapter 8 Big Data and Privacy
Chapter 8 Big Data and PrivacyChapter 8 Big Data and Privacy
Chapter 8 Big Data and Privacy
 
Anonomity on Internet
Anonomity on InternetAnonomity on Internet
Anonomity on Internet
 
Internet issues
Internet issuesInternet issues
Internet issues
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
How to create a yahoo and hotmail accounts and how to connect to the internet
How to create a yahoo and hotmail accounts and how to connect to the internetHow to create a yahoo and hotmail accounts and how to connect to the internet
How to create a yahoo and hotmail accounts and how to connect to the internet
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policy
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
Spamming as cyber crime
Spamming as cyber crimeSpamming as cyber crime
Spamming as cyber crime
 
iGO eBooks - Website(s) Policies, Procedures, & Practices
iGO eBooks - Website(s) Policies, Procedures, & Practices  iGO eBooks - Website(s) Policies, Procedures, & Practices
iGO eBooks - Website(s) Policies, Procedures, & Practices
 
Terms and Conditions
Terms and ConditionsTerms and Conditions
Terms and Conditions
 
[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...[Albanyinfragard] infra gard albany members alliance april security tips news...
[Albanyinfragard] infra gard albany members alliance april security tips news...
 
Beginners guide to the internet 26.10.15
Beginners guide to the internet 26.10.15Beginners guide to the internet 26.10.15
Beginners guide to the internet 26.10.15
 
Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15
 

Similar a Research Project Ms

online spying tools
online spying toolsonline spying tools
online spying tools
Deepa Jacob
 
Ntia 0900
Ntia 0900Ntia 0900
Ntia 0900
gsgiles
 
Internet Services
Internet ServicesInternet Services
Internet Services
abena
 

Similar a Research Project Ms (20)

Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
 
Introduction to Internet for Library Patrons
Introduction to Internet for Library PatronsIntroduction to Internet for Library Patrons
Introduction to Internet for Library Patrons
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Ntia 0900
Ntia 0900Ntia 0900
Ntia 0900
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
Web browsing and communication using Outlook
Web browsing and communication using OutlookWeb browsing and communication using Outlook
Web browsing and communication using Outlook
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Pl internet(cyberspace)
Pl internet(cyberspace)Pl internet(cyberspace)
Pl internet(cyberspace)
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Password Management
Password ManagementPassword Management
Password Management
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
What is internet
What is internetWhat is internet
What is internet
 
Internet Services
Internet ServicesInternet Services
Internet Services
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
Powerpoint Lejla Gacevic
Powerpoint Lejla GacevicPowerpoint Lejla Gacevic
Powerpoint Lejla Gacevic
 
Powerpoint Lejla Gacevic
Powerpoint Lejla GacevicPowerpoint Lejla Gacevic
Powerpoint Lejla Gacevic
 
Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Monitising mobile (data and infomation)
Monitising mobile (data and infomation)
 
Internet Use Issues.pptx
Internet Use Issues.pptxInternet Use Issues.pptx
Internet Use Issues.pptx
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Research Project Ms

  • 1. PRIVACY THREATS ON THE WEB MARIA SANTOS
  • 2.
  • 3. A cookie is a piece of information that an Internet website sends to your browser when you access information at that site. Each time you use your computer to access that same website, the information that was previously received is sent back to the website by your browser. Cookies indicate to a website that you have been there before and can be used to record what parts of a website you visit. While cookies in themselves may not identify you, a cookie could potentially be linked with other identifying information . If you provide extra information about yourself to the website by buying something on-line or subscribing to a free service, then the cookies can be used to build up a profile of your buying habits and what you are interested in . There are various things you can do to combat cookies if you distrust them, these include: Setting the browser cookie file to be Read Only or also try one of these software products which will reject or manage cookies for you, like COOKIE CRUSHER, COOKIE PAL or COOKIE CRUNCHER. COOKIES
  • 4. When you access a web page from a website, the website expects you to provide certain information so that it can provide the page you request. The HyperText transfer protocol (HTTP) is the set of rules that websites and browsers follow in order to communicate. One obvious piece of information the website will require is what page you want to look at. The technical term for the location of this page is the Uniform Resource Locator (URL). There are various aspects of HTTP which may allow your surfing activities to be tracked . Other information which may be sent whenever you request a web page includes your e-mail address and the last web page you looked at. Whether this information is transmitted is dependant on whether your browser supports these options and whether you have got your browser configured with your e-mail address. HTTP
  • 5. The most widely used browsers are the various versions of Netscape Navigator and Communicator and Microsoft Internet Explorer . Other less widely used browsers include Mosaic, which was one of the original browsers and Lynx which is a text based browser. There have been many reports of security bugs in browsers which can allow hackers and websites to access your personal information while you are surfing the web. Netscape and Microsoft often provide fixes for these bugs soon after they become aware of them, these can be downloaded from their websites. It's difficult to assess the risk to your personal information of using any particular browser, but it may be wise to keep up to date with news about security bugs BROWSERS
  • 6. Governments, schools, businesses and other organizations may have already collected personal information about you. Information collected by governments is sometimes publicly available in the form of Public Registers. The Electoral Roll , and the Telephone Directory are Public Registers . Your school, university or employer may publish your name or other information about you. Much personal information which is publicly available has been collected and combined into databases by web based companies which then sell this information to businesses or individuals . Comprehensive and sometimes inaccurate profiles of individuals can be derived by combining information from many sources. As there is little or no law anywhere in the world governing this sort of activity there's not much you can do about it, but at least you can be aware of it. INFORMATION ABOUT YOU PUBLISHED ON THE WEB
  • 7. There is a lot of free and cheap software available for download on the Internet. It may be difficult to avoid using freeware and shareware as much of this software underpins the Internet (some popular web server applications are free as are the two most popular browsers, Netscape Navigator and Microsoft Explorer ). However, it may be prudent to keep track of information about freeware and shareware and only use the software that is widely used and has a good reputation. Downloading freeware or shareware
  • 8. These are web-based software tools that allow you to search for information on the Internet. Some of the most well known ones are Google, Yahoo, Alta Vista, Hotbot, Excite, Infoseek and Web-Crawler. Many of these offer facilities to search for people. If your name appears somewhere on the Internet then these search engines can find it. Your name may be associated with other information about you so it may be possible for anyone using search engines to find out quite a bit about you. Some search engines also allow the searching of news groups for postings associated with an e-mail address. Search Engines
  • 9. ELECTRONIC COMMERCE If you buy something from a commercial web site you will probably have to use a credit card. This means you will be transmitting your credit card number over the Internet . Currently a widely used security system is Secure Socket Layer (SSL) which is built into the major browsers . While SSL may provide protection during the transmission of Credit Card numbers there are also concerns about the secure storage of Credit Card numbers. There have been instances where hackers have stolen lists of Credit Card numbers from ISPs and commercial web sites. Governments and businesses are keen to encourage Electronic Commerce but there is some resistance by consumers due to concerns about security and privacy. Currently Internet businesses seem to require you to provide more personal information than you would for over the counter purchases. Many people are concerned that this information will then be re-used for another purpose or sold to direct marketers
  • 10. How you set up your e-mail address may affect your privacy. Like street addresses e-mail addresses are essentially locators , but they locate you in cyberspace rather than real space. The format of an e-mail address is A@B.C.D, where A is your name or handle, B is usually your Internet Service Provider (ISP) or the organization you work for, C and D are called domains. The C domain may refer to your area of work or activity.. The advantage of using a nym is that you can then only reveal your identity to who you want to know it . If you go to the trouble of using a nym you should be careful to set up your e-mail application, so that the name and identity fields are left blank. If you want to use a nym it is important to use an ISP that has disabled the Finger utility. If this is not disabled then anyone may be able to use your e-mail address to find out your name and other information about you. E-mail
  • 11. Spam is junk e-mail. Many people who have purchased something over the Internet or have their e-mail address published on a website or have subscribed to a news service or who have participated in news groups or mailing lists, get spam. This is because these public sources can be harvested for e-mail addresses . Some ISPs and other Internet businesses have sold lists of their customer's e-mail addresses to spammers. This is now considered to be very bad form. Spammers have been known to use programs to randomly generate e-mail addresses . Spam has become so prevalent that it can compromise and slow down the whole network. There is now a big anti-spam movement and there are various spam filters you can get to filter out and delete spam. Unfortunately, spam persists. The fact that spam is a use of your e-mail address for a purpose that you don't agree to and that you are actually paying for the delivery of the spam makes it particularly annoying. SPAM
  • 12. Chat groups have become very popular. As they operate in real-time they are similar to telephone party lines . Many people who participate in chat groups use nyms or handles, so you don't really know who you are chatting with or even their gender . Some people have established relationships on chat groups which they have continued in real life. However, it is important to note that your personal safety may be at risk, if you meet people from chat rooms, otherwise unknown to you. Dangers of Internet Chat