Chapter 48 - Personal Web Pages
Download
Report
Transcript Chapter 48 - Personal Web Pages
ITIS 1210
Introduction to Web-Based
Information Systems
Chapter 48
How Internet Sites Can Invade Your Privacy
Introduction
Privacy on the Net
Growing concern
Much information gathered
Who will use it?
How will it be used?
Three basic technologies of concern
Cookies
Tracking
Bugs
Introduction
Some technologies have useful purpose
Cookies
Tracking
May be used maliciously also
What if government is behind it?
“Big Brother”
Cookies
Small data file placed on your computer
May contain
Username and password
Favorite sites
Last time you visited
Uses:
Identifies your preferences
Eliminates need to log on
Cookies
Name comes from “magic cookie” as used
by Unix programmers
Packet of data passed between
programs
Nor meaningful itself
Used as an identifier like a coat
check ticket
Created by Lou Montulli
1994 at Netscape
Cookies
Why cookies?
The Web is basically “stateless”
No memory of previous events
A site doesn’t “know” that
You’re a user
You have an ongoing “conversation”
Sites only
Accept requests
Deliver content
Cookies
Cookies are formatted in a special way
Can only be read by the site that placed them
Where are cookies stored?
Netscape
Cookies.txt file
Each line is one cookie
Internet Explorer
Tools … Internet Options … Settings … View Files
Cookies
How they work
You visit a Web site
Your browser examines the cookie files
If one from that Web site is found
Browser sends that file’s information to the site
Site now “knows” something about you
Servers can place cookies on your hard
drive
With/without your permission
Cookies
Example – you’re shopping on the Web
Cookie established for you with a unique
“shopping session ID”
May have an expiration date
Every time you put an item in your cart, the
site’s server
Erases old cookie
Stores new cookie (with all your current items)
Server can read your cookie at any time to
find the current status
Tracking
Examine log files
What pages are most popular?
What IP addresses are using a site?
How many pages are read in a typical visit?
What order are pages read in?
What page are users on when they click on a
link that brings them to another page
Clickthrough
Tracking
Sniffers
Examine packets coming into or out of a site
Identifies users
Cookies
IP addresses
Tracking
Accumulates data about
Who is making requests?
Where are the requests coming from?
Average amount of time spent on a site
Average number of pages read per session
Most popular pages
Helps make sites better
Bugs
“Bug” as in “wiretap”
Can be included in email
Lets others actually view your email
Basic purpose is to trace a user’s use of
the Web
Sites they visit
How they get from one site to another
Can also be used to intercept email
Bugs
Works in HTML-enabled email
An offer of some service or for a product
Email contains two items:
JavaScript code that can read the email
message
A “clear GIF”
HTML reference to a tiny graphic
One pixel in size
Transparent (so you can’t see it)
Bugs
The JavaScript code reads the email
Your browser contacts the server to
download the clear GIF
Remember what’s in a packet?
Identifying information
Your IP address
The server now knows something about
you
Bugs
The server can place a cookie using
identifying information sent by Web bug
Can match cookie with identifying information
from the email
Can now track your use of the Internet
Who responded to this offer
If that person forwards the email to
someone else the process begins again
Internet Passports
Lets user control
Which personal information can be released
to a Web site
What type of information on surfing habits can
be gathered
How that information can be used
Internet Passports
Variety of methods available
Platform for Privacy Preferences (P3P)
Privacy Finder at Carnegie Mellon University
Internet Content and Exchange Standard (ICE)
Open Profiling Standard (OPS)
Starts by filling out a profile
For more information search for “internet
passport” or go to www.passport.com
Privacy Organizations
Electronic Privacy Information Center
http://www.epic.org/
Internet Passports
Starts by filling out a profile
Identifies person
Name, address, phone, etc.
Identifies Surfing data that can be shared
Or not!
Profile stored in browser
When person visits a Web site the
passport is sent to that site
Internet Passports
Site’s server examines data in the
passport
Might automatically log a person in if they
included their username and password in the
passport
While at site the person reads a sports
story and buys a book
Profile permits inclusion of sports story but not
about the purchase
Internet Passports
Person visits another site
That server “sees” that the person has
recently read a sports story
But not about the purchase because the
passport doesn’t permit it
Might then send him an ad about sports
memorabilia
But not about books on sale
Internet Passports
At a different site the server “sees” that the
person has restricted information about
their buying habits
Server declines to send Web pages to a
user with this kind of profile
The user can’t even view the Web site