Chapter 6: Tracking and Surveillance Flashcards
What is UDP?
User Datagram Protocol
It is a protocol that sits on top of IP and is used to transmit data
What is the main difference between TCP and UDP?
TCP guarantees delivery, UDP does not
This allows UDP to transmit faster when speed is more important than reliability (for example, video streaming)
List 3 mail server protocols
Internet Message Access Protocol (IMAP)
Post Office Protocol (POP)
POP3
Which mail server protocol erases data from the server once it is downloaded?
POP and POP3 (depending on configuration)
Which method of sending data to a web server includes additional information in the URL? Get or Post?
Get
What part of a message is required to route it to the proper destination?
The IP header
What do you call it when network hardware examines the full body of a message?
Deep packet inspection
What is the purpose of deep packet inspection?
- Determine whether or not the packets contain malicious content
- Help prevent data leaks (DLP)
- Track users’ online behavior (advertisers)
- Censor or track citizens’ online behaviors (government)
- Allows network traffic and bandwidth shaping based on the content of a packet
- Determine the type of content being sent from one host to another (to apply rate limits)
List 2 common attacks performed through Wi-Fi eavesdropping
Packet-sniffing systems
HTTP session hijacking or side-jacking
List 4 Wi-Fi encryption schemes
WEP - Wired Equivalent Privacy
WPA - Wi-Fi Protected Access
WPA2
WPA3
Which Wi-Fi encryption schemes are considered secure?
WPA2
WPA3
How can spyware monitor user activities?
Capturing cookies to determine browsing history
Performing screen captures and transmitting images back to the attacker
Keylogging
Does HTTPS provide anonymity?
No - network observers still can see the source and destination of traffic
What are first-party cookies?
Those set by the primary page that the user is visiting
What are third-party cookies?
Cookies set from all companies other than the primary website whose URL is displayed in a browser
What are beacons or web bugs?
Elements used for tracking that are not visible to the user in the rendered web page
What are the 2 types of cookies?
Session
Persistent
What is URL rewriting?
Websites tracking the links a user clicks on a web page
Which technology can use a computers Media Access Control (MAC) address for tracking?
IPv6
What means of storage is used by the Adobe Flash plug-in?
Local Shared Objects (LSOs)
AKA Flash cookies
Where are LSOs stored?
On the hard drive, separate from HTTP cookies (so clicking clear cookies may not clear LSOs)
How do many website respawn cookies?
They use LSOs to respawn deleted information
Internet Explorer has it’s own way of storing data on the local hard drive, this is called…
userData storage
Not cleared when cookies are deleted!
What is a pixel hack?
A unique identifier is written into a minuscule image, generated on the fly, in the form of the color values for one or more pixels
Since images are often cached, or stored locally by the browser to avoid having to download the resource again in the future, these tracking values can often be retrieved later