Preview

Student

Good Essays
Open Document
Open Document
678 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Student
Cookies as Spyware
This paper addresses Cookies as Spyware. The option chosen was to analyze the issues associated with cookies being used as spyware. Are cookies pieces of malicious, benign, or innocent software? The next paragraphs of this paper will discuss the various uses of cookies. And, then, the paper will conclude with my opinion about cookies based upon my research findings.
Since web browsing uses a stateless connection, cookies are used to maintain the state of a browsing session. Cookies are small data files that are produced by a web server that are stored on your computer. Cookies allow a personalized web browsing experience because of the identifying information that they store within them (such as login information, passwords, web pages visited, and/or items placed in a shopping cart). There are different types of cookies that are created for specific purposes. They include session, persistent, first-party, and third-party cookies. Session cookies are used to store information related to a particular visit during one session. Persistent cookies are used to store information permanently on your hard drive about your interactions and/or preferences with a certain web site. First-party cookies are used by the specific site that created them while their website is being visited, whereas third-party cookies are not created by the website that is being visited. Third-party cookies are created by another website besides the website being visited such as a banner advertisement on the web page that is being visited. (“Encyclopedia,”)
While most cookies appear to be used solely for the purpose of enhancing the user’s web browsing experience, cookies can be used for other purposes including adware or spyware if they contain active code. Adware is used to automatically download or display advertisements on a person’s computer. Spyware is technology used to gather information about a person or organization without their consent or knowledge and relay that



References: Encyclopedia. (n.d.). PCMagazine, Retrieved from http://www.pcmag.com/encyclopedia_term/0,2542,t=cookie&i=40334,00.asp Information security magazine. (2008, October 5). Retrieved from http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214518,00.html Are all cookies dangerous?. (2010, March 30). Spy Cookies Blocking the way for PC spies, Retrieved from http://www.spycookies.com/2010/03/

You May Also Find These Documents Helpful

  • Powerful Essays

    6. Cookie: A line of identifying text, assigned and retrieved by a given Web server and stored by your browser, that can be used to build a profile associated with your Web activities.…

    • 2817 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Throughout the article there were many valid points as why using spyware is good to use to monitor your kids internet usage. Harlan Coben states that spyware is not used to to spy on your kids it used to monitor and look out for your child. Some things that you would want to look out for could possibly be cyber bullying inappropriate postings, or…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    student

    • 1126 Words
    • 4 Pages

    Which of the following roles implement what can be classified as infrastructure services? DNS and DHCP…

    • 1126 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Student

    • 475 Words
    • 2 Pages

    Puck, instead of squeezing the flower juice on Demetrius and making him fall in love with Helena, he squeezed the flower juice on Lysander who was supposed to be in love with Hermia. When Lysander woke up, he saw Helena so that made him fall in love with Helena. This affects him because he said all of those things to her and was supposed…

    • 475 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    student

    • 694 Words
    • 3 Pages

    Merry Shelly’s Frankenstein shows how Victor ignores many things like his social life, family and most of all his own creation. Victor Frankenstein ignores the creature completely; he doesn’t give the creature any of his attention. The creature tries his best to get Victor’s attention by talking to him first, but when that doesn’t work on Victor; the creature changes his game to violence. Merry Shelly shows that you cannot ignore problems, you can either confront them positively or they will require your attention through negative responses.…

    • 694 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Harlen Coben in editorial “The Undercover Parent” ( March 16,2008 ) claims that parents should have conversations about their concerns with their teenagers ,and let them know spyware is a possibility. The Author supports and develops the thesis by putting enough evidence to the article. He also supports the thesis by convincing people to use spyware is a possibility.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Internet Exercise

    • 1886 Words
    • 8 Pages

    * Internet marketers use browser cookies to keep track of consumers’ behavior. Browser cookie is a small piece of data sent from a website and stored in a user’s web browser while a user is browsing a website.…

    • 1886 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    1. What company was sued because its Web site 's advertisement placed cookies on the computers of…

    • 3371 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge.…

    • 884 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Privacy is a growing concern in the United States and around the world. As we increasingly use the Internet and the seemingly boundary less options for collecting, saving, sharing, and comparing information trigger consumer’s worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives.…

    • 1849 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Undercover Parent

    • 1438 Words
    • 4 Pages

    Have you ever wondered if your child’s safety could be endangered on the Internet? Or how about what websites they could be going onto and if they are talking to strangers? These are some topics that Harlen Coben discusses in his article entitled “Undercover Parent”. He suggests that parents should put spyware on their child’s computers, or other electronic devices, to monitor their Internet usage, activity, and safety. Now some may say that this is an invasion of privacy, but others disagree and say that it will benefit your child. Throughout the article, Coben presents information about the pros and cons of spyware. In my opinion, I both agree and disagree with Coben’s argument on spyware.…

    • 1438 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    my reflection

    • 627 Words
    • 2 Pages

    National childrens advocacy center. (2014). Retrieved July 6, 2014, from Internet Safety Tips for Kids and Teens: http://www.nationalcac.org/prevention/internet-safety-kids.html…

    • 627 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In today’s online market, some of the best companies do not make that much money off of their products. Instead, they make money off of gathering information about their clients/customers. People may ask, “How do they do this?” But the answer is simple, they track your cookies that you leave behind when you browse a website. Have you ever noticed that you went to look up a product, and you decided not to buy it that same day? But then, you go online, then next day and see ads all over websites with the product that you were thinking of buying. They call this cookie proliferation, and the Executive Editor of PCWorld, Melissa Riofrio, wrote an online article “The 5 Biggest Online Privacy Threats of 2013,” in which she says that “It’s totally invisible to users. They have no idea what’s happening” (Riofrio para 9). Meaning…

    • 756 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Legality of Spyware

    • 949 Words
    • 4 Pages

    The internet has become a large part of our lives today. With the use of the internet growing comes a growing number of problems with service. One of these major problems is spyware. According to Wikipedia[1] “spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user 's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.” This essay will address the problem that is spyware and try to pose an answer to the question of whether or not spyware should be made illegal.…

    • 949 Words
    • 4 Pages
    Good Essays