Online Privacy Flashcards

1
Q

World Wide Web

A

collection of information that is accessed via the internet

is system most people use to access the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

clients/servers

A

computers connected to internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

web client

A

device or software used to connect an individual to the internet

refers both to the internet connected device as well as the software used to connect to the internet(ex. Google Chrome, FireFox, Safari)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

web browser

A

software that is used to connect to the internet and interpret files in order to present them to a user(ex. Chrome, Safari)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

web server

A

computer that stores files that may be accessed via the internet (form the basis for website and applications)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

packets

A

transmission of small chunks of data over internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

protocols

A

ground rules for transferring data over the internet

ex. TCP/IP, HTTPS, SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

hypertext transfer protocol (HTTP)

A

simple application level protocol

language by which a web client can communicate with WWW (interfaces with the internet, or the network and transport layers of the internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hypertext transfer protocol server (HTPPS)

A

predominate application- level protocol

transfers data over an encrypted connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transmission Control Protocol and internet protocol (TCP/IP)

A

main communication protocols of internet that sets forth system of rules that facilitate communication and information sharing

allows 2 devices to establish reliable data connection which allows steaming of data

process
1. TCP protocol breaks down info into packets and addresses them to appropriate location
2. packets travel across internet form router to router under IP protocol
3. TCP protocol is used to reassemble the packets of data before being received by client or server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

transport layer security

A

provides communication security by allowing web user (client) to remain private from web server or vice versa

3rd parties can’t intercept or interfere with connection

when client contacts server “handshake” occurs where client and server authenticate each other and select encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

internet protocol address (IP address)

A

unique number assigned to each device connected to internet, including web servers

IPv6- most recent version of IP protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

dynamic IP address

A

created when internet service provider assigns a new IP address upon the beginning of each new web session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

static IP address

A

more likely to be considered personal information because it is more easily associated with specific individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

uniform resource locator (URL)

A

domain name and web address of files and other materials located on web server

each URL is associated with IP address that points to specific web server

http://instagram.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

domain name server (DNS)

A

converts domain name (URL) to IP address associated with domain name

aka telephone book of internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

proxy server

A

intermediary web server that provides gateway to web

can mask what occurs behind firewall, be used to log each users interaction, serve as added security measure

used in large organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

virtual private network (VPN)

A

established encrypted connection known as tunnel through which data can travel between user and proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

server log (web log/web server log)

A

record of visitors to requested web page

includes information regarding
- visitors IP address
-data and time of page request
-URL of requested file
- visitors browser type
- URL visited immediately prior to accessing the URL (referring page)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

cache

A

copy of downloaded content that is stored locally on web client

this allows web client to eliminate need to download same content again from web server (don’t need to download next time user visits website)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

programming languages

A

used to create list of commands to be executed by specific server or client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

scripts

A

where list of commands or file commands are saved for programming languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

browser side- programming language

A

aka front side

contained in scripts run by web client after script has been downloaded off of the web server

include:
- HTML
- CSS
- javascript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

hypertext markup language (HTML)

A

used to create structure of webpages

HTML 5 is newest version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

cascading style sheets (CSS)

A

used to dictate presentation of webpage

ex. color background, size of text etc

26
Q

javascript

A

allows for interactive websites

dictates how a website responds to user interactions

ex. box you can click on

27
Q

server side- programming languages

A

aka back end

run by an interact directly with web servers- web server will run server side script before sending any browser side script to web client

used when dynamic content is needed for webpage (ex. latest real estate listing

includes PHP

28
Q

PHP

A

general purpose programming language originally designed for web development

relies on both HTML and CSS + structured query language

29
Q

passive data collection

A

automatic data collection of user data

no express consent

30
Q

active data collection

A

collected with users knowledge- generally through use of web forms

31
Q

web form

A

part of webpage that allows user to input data in text field, drop down menu, radio buttons, or other means then submit info to web server to process info or store info in database

issue: potential to create security vulnerabilities since user can submit data directly to server or data base (ex. text box)

solution: place limits on text fields to ensure they are used as intended

32
Q

syndicated content

A

content developed by 3rd parties and purchased or licensed for presentation directly by host site

possible for it to contain malicious code that collects data in different ways than set forth in host site’s privacy notice

33
Q

co-branded website

A

partnership between 2 organizations where both provide content or services on single website

have own privacy notices so it is clear to users that content belongs to and users are interacting with both partner entities

34
Q

web services

A

program contained within website that allows 2 organizations to directly communicate between their computers or servers

application program interface- set of protocols routines functions and or commands that programmers use to develop software or facilitate interactions between distinct systems

35
Q

web widget

A

graphical interface on website that is controlled by 3rd party

ex. tweet displayed on different website- if tweet was deleted on twitter it would no longer appear on 3rd party website

36
Q

iframe

A

HTML element that permits an external webpage to be directly embedded into a website

website doesn’t control content of 3rd party website only where on website iframe is located

37
Q

3rd party marketing

A

ads that appear on webpages

usually controlled by online advertising networks- connect online advertisers with website owners who host ads on their websites

38
Q

cyber threats

A
  1. spam
  2. malware
  3. phishing
  4. structured query language injection
  5. cross site scripting (XSS)
  6. cookie poisoning
  7. unauthorized access
39
Q

spam

A

unsolicited commercial emails or messages

often contain viruses and other malware or direct a user to a website containing such malware

40
Q

malware

A

software designed for malicious purposes

2 types
1. spyware
2. ransomware

41
Q

spyware

A

specific form of malware downloaded covertly and without the consent or understanding of the user

42
Q

ransomware

A

permits malicious actor to loc a users operating system or encrypt data on a device, preventing access by the user to his/her files

then malicious actor demands ransom to allow user to access data

43
Q

phishing

A

communications that are designed to trick users to believe that they should provide information to the sender

usually send through email and targeted

types
1. spear phishing- targeted at 1 person
2. whaling- targeted at important individuals (ex. politician)

44
Q

structured query language injection

A

malicious actor attempts to provide a database command to a web server through input fields contained in web form on website

45
Q

cross site scripting (XSS)

A

malicious code is injected into a webpage

results in unauthorized content appearing on webpage or tricks user into thinking that the site is corruptedc

46
Q

cookie poisoning

A

cookie is modified in order to gain unauthorized access to information about user or towards some other nefarious end

47
Q

ways to avoid cyber threats

A
  1. two factor authentication
    - user required to provide more than one form of authentication
  2. data validation
    - ensuring data conforms to identified requirements and quality benchmarks
    - ex. if inputing email then must verify there is @ with words before and after it
  3. data sanitization
    - takes data input by user and modifies it by removing potentially harmful input characters
48
Q

steps to minimize possibility of human error

A
  1. passwords are unique, not shared across users, and regularly changed
  2. antivirus/firewall systems are updated regularly
  3. employees training should include instruction on not using public computers or public charging stations and only using secure and familiar private wi-fi networks
49
Q

behavior advertising

A

targeted ads based on info associated with an individual

government entities that address concerns about such advertising include
1. FTC do not track
- consumers can make single choice to opt out of such ads

  1. digital advertising aliance- ad choices
    - icon that permits consumers the ability to exercise choice with respect to behavior advertising
  2. EU- directive 2009/136/EC- EU cookie directive
    - requires users to give consent before having cookie placed on their computers
    - prevents cookie tracking without consent
50
Q

consumer tracking - cross device tracking

A

mapping user as he moved between devices

accomplished through deterministic tracking or probabilistic tracking

51
Q

deterministic tracking

A

allows organizations to track users device based upon where he logs into services

ex. log into on computer to purchase product from company and later logs into another computer to purchase product from same company- can tell both computers associated with same person

52
Q

probabilistic tracking

A

connects users devices based upon assessment of probabilities and proprietary algorithms drawn from info collected on multiple devices

53
Q

consumer tracking- cross site tracking through tracking cookies

A

small text file placed on hard drive of device by web server

3rd parties can link device to prior activity through tracking cookies

may be considered as personal information

best practices for using cookies:
- never be used to store unencrypted personal info
- provide notice when cookies are being used
- should disclose 3rd party cookies providers
- opt-out function where practicalt

54
Q

session cookie

A

stored only while user is connected to specific web server and is deleted when user closes his web browser

55
Q

persistent cookie

A

set to expire at some point in future according to predefined time

identifies particular device for user authentication

persistent cookies should be only used where necessary and are set to expire after reasonable length of time

56
Q

1st party cookie

A

set and read by web server that is hosting the website being visited

57
Q

3rd party cookie

A

set and read by party other than web server hosting the visited website

58
Q

flash cookies

A

stored outside of internet browsers control and is controlled and accessed by adobe flash

difficult for users to delete, do not expire, users not provided notice of their use

may be used to respawn a deleted HTML cookie (ex. zombie cookie)

59
Q

consumer tracking- cross site tracking through web beacons

A

dear one pixel by one pixel graphic image delivered by web server

purpose is to record consumers visit to web page and measure digital advertising performance

notice to users is important to provide

bluetooth beaconing is where low energy bluetooth signal is sent from beaconing device and picked up by mobile device setting in motion process that displays ad to owner of mobile device

60
Q

consumer tracking- cross site tracking- adware

A

software that monitors end users behavior so that advertisers can better target advertisements toward a user

location based advertisements- rely on mobile device GPS receiver, Wi-fi, and bluetooth

61
Q

consumer tracking- cross site tracking- digital fingerprinting

A

uses IP address, referring URL page, and browser type being used to identify user

can be used to increase security (ex. require additional authentication if user logs in from device organization doesn’t recognize based on fingerprint)

62
Q

children’s online privacy laws/regulations

A
  1. COPPA (federal, protects children under 13)
  2. GDPR (orgs that collect info on EU residents must not process data of children under 16 unless parental consent)
  3. Digital World Act (CA state, under 18 have right to request removal of info posted by them online, and no online advertising of products children are not legally permitted to purchase)
  4. Delaware online and personal privacy protection act (DOPPA) (state, similar to digital world act)
  5. California consumer privacy act (no sale of PI of CA consumers under 16 without appropriate consent)
    - 13-15 consent must may be obtained directly from child through opt in
    - 13 and under- consent must be obtained by parent or guardian