COOKIES
The word cookie gives a thought
of a chocolate chip cookie but here the term stands for HTTP cookie which is
commonly known as web cookies, internet cookie, and browser cookie and now
known as magic cookies. Computer cookies comprise of information and are
basically files. These files are responsible for storing data which is specific
to a particular user and website. Cookies are responsible for getting accessed
to that specific data whenever needed. It allows client to website association
and keep the record. It can also keep record of visits on the website on
different occasions. A user can check
his cookie association via cookie checker. It is a webpage which will have an
access to the cookies and will confirm the action. In short, we can say that a
user visits a website and the website sends cookie, the cookie is saved in
computer. The computer keeps the cookie saved in web browser and in order to
make the access easy the file is saved with the title “Cookie” in web page (Andrews, 2012).
TYPES of cookies
There are many types of cookies
present and possess the tracking ability. These types include tracking cookies,
authentication cookies and session cookies.
1.
TRACKING
COOKIES
This type of cookies keep record
of long term usage of a particular website and keeps track of multiple visits.
2.
AUTHENTICATION
COOKIES
Authentication cookies keep
information of the user and make sure the information provided is authentic and
verifies the name of the user.
3.
SESSION
COOKIES
These types of cookies are temporary
and are active as long as user is active on the website and disappears when the
user leaves the place.
SAFETY OF INTERNET COOKIES
The internet cookies are safe.
Normally cookies are unable to transfer any kind of malware to our computer as
the data it possess travels back and forth so it cannot transfer any file
containing virus. The third party tracking cookies lack the ability to assure
complete privacy and safety as privacy concerns might rise due to such types of
cookies.
PRIVACY of cookies
Privacy is term which determines
the freedom of an individual and allows them to use anything from internet
freely from different locations. In terms of computer privacy, it is the
information which is shared by a user to a website or a webpage. The
information provided can be used to track the location of the user. Information
privacy is a term which basically gives right to a user to have webpage access
to his personal information and manages to what extent (W. Chan Kim, 2014)
IMPORTANCE OF PRIVACY OF COOKIES
With growing science and
technology privacy has become a greater concern. When huge amount of data is
collected, saved and shared the exchange and transfer of data has become
complex. With increased sophistication of privacy which has ability of
invading, uses of data has also increased. Privacy has become more evident and
privacy issues of user have also risen. Privacy is the most common consumer
protection issue. Privacy is necessary available and it is required to do any
kind of business online via webpage (Tipton, 2014)
DIFFERENCE BETWEEN PRIVACY AND SECURITY OF COOKIES
There is a very small difference
between privacy and securities both are closely related. Main focus of the user
privacy is the usage of shared data with the webpage; it includes the factors
such as personal information of the user, its usage and sharing in appropriate
ways. While, main focus of the security is that it protects the provided data
of the user from hacking and any type of threat. Security is always required
for the protection of the data; security is required to ensure privacy of the
user.
SECURITY ISSUES OF COOKIES
When the security system of a web
page or an organization is flawed it gives rise to security issues. Security
issues arise when someone tries to hack the personal data of the user and
becomes invasive and violates and individual’s privacy policy. If the issue is
faced by a single user the whole network can be affected and suffers. The
webpages are highly secure but still possess the potential to harm the data and
user and result in security issues.
TYPES OF SECURITY ISSUES
Security issues may give rise to
several issues. Some of them are stated below;
·
Loss of data
·
Malware attacks
·
Security breaches
·
Hacking and transfer of virus
PROTECTIVE MEASURES
·
Installation of antivirus software and
·
Updated setting in the internet router or other
operating systems
·
Systems for data encryption
·
Having data backup
·
Restricted data access policy
WHAT ELSE CAN BE DONE?
Different protective and preventive
measures can be taken to eliminate the risk of security issues. The user must
not allow its network and computer system to have access to unauthorized sites
and warns the user if it goes towards harmful websites. Practically, it is not
possible to eliminate all of the vulnerabilities or risk factors but due to
growth and research in technology, one can reduce the damage or minimize its
effect on computer network. It protects from the risks such as loss of
important data. The IT is responsible for the detection and minimization of
such cyber or network threats available on net (Mihai Christodorescu, 2007)
IMPORTANCE security issues
In order to have a fast and
smooth functioning computer network one must be protected from all kinds of
security issues. It can be done through backing up the important user files,
keeping a track of passwords and changing it in routine, system logs and by
stopping the data access to unwanted or previous employees as they can exploit
and make the important and confidential data available to everyone online for
their different personal reason. It is better to be safe than sorry.
REFERENCES Of privacy and Security issues
Andrews, L. (2012). I Know Who You Are and I Saw
What You Did: Social Networks and the Death of Privacy. Simon and Schuster,
.
Mihai Christodorescu, S. J. (2007). Malware
Detection. Springer Science & Business Media, .
Tipton, H. F. (2014). Information Security
Management Handbook, Fourth Edition, Volume 3. CRC Press, .
W. Chan Kim, R. A. (2014). Blue Ocean Strategy,
Expanded Edition: How to Create Uncontested Market Space and Make the
Competition Irrelevant. Harvard Business Review Press, .