14: Privacy and Firewalls Flashcards
What are sources of online privacy risks ?
- HTTP cookies which store history data
- Any kind of log files
- Search engine trackers
- Social network trackers
- ISP, government, employers surveillance
Give 8 principles of the Data Protection Act (1998) ?
- Accurate
- Secure
- Fairly and lawfully processed
- Processed for limited purposes
- Adequate, relevant and not excessive
- Not kept longer than necessary
- Data subject’s right are respected
- Not transferred to countries without adequate protection.
What is the gist of the Data Protection Act ?
People have a right to see their data and can insist on removing irrelevant data if they want.
Furthermore, companies need your PERMISSION if they want to use the data they collected on your for some purpose other than the original intention.
They cannot sell your data without ASKING.
What is the security practice like in Britain ?
- Mass government surveillance.
- ISPs keep copies of everything.
How to increase security ?
- Disable cookies
- Use ad-blockers, VPN, anonymous emails
- OpenPGP
How does a proxy or VPN work ?
It prevents one’s IP address from being forwarded to the website in use.
What is a firewall ?
A network security system which monitors and controls the incoming and outgoing network traffic based on predetermined rules.
Give 4 types of firewall controls ?
- Service control: which types of internet services are available
- Direction control: flow through firewall
- User control: local users
- Behaviour control: eliminates spam
What does the first generation: packet filters do ?
It looks at the network addresses and ports of a packet and determines if the filter
allows, drops or rejects
the packet.
What does the second generation: stateful filters do ?
Circuit level gateaways.
- Operate up to transport layer of OSI model
- Retain packets until enough information to make judgement about its state
Filter determines whether a packet is the:
- Start of a new connection
- Part of an existing connection
- Not part of any connection
Is the connection state a filter criteria ?
Yes
What does the third generation: application layer ?
Firewall ‘understands’ applications and protocols such as
HTTP, DNS, FTP,
and it can detect if an unwanted application is trying to bypass the firewall using an allowed port.