Why Are Cookies Bad

Improved Essays
What are cookies and are they a good thing or a bad thing. Cookies, not the gooey chocolate chip type but a computer version got their name from a Unix program, Fortune Cookie, that creates a different message (fortune) each time the program runs. Messages passed to your computer’s internet browsers each time you visit websites stored in small files are what are known as cookies in the computer world. Information you’ve entered as well as other calculated information such as what pages you visited and how often is all stored in the cookie files. A good example of use of cookies, would be when shopping online and you’re not able to finish your transaction because you must leave home. You close out of your browser and shut down your computer. …show more content…
Not only user name and passwords can be stored by websites, but data such as credit card numbers, name, income, age and other information used together could give someone access to your entire livelihood. Even if one individual website only stores one piece of information, the combination of all the cookies stored on your computer could give a hacker the ability to connect the pieces and steal your identity. To open a new line of credit someone may only need to know your name, address, driver’s license number and social security number. If an individual went uses their first and last name as user name on most websites and saves them so they don’t have to enter them every time they re-visit each site, they order fast food from the same place every week and have their address saved for the delivery of their favorite pizza, they updated their driver’s license number on their car insurance website recently and verified their SSN on their personal banking website because they lost access and need to request their user name and password; a hacker now has all the information they need to steal that person’s identity stored all on that individual’s computer. That is why there are privacy laws that set out to guard this information. The bulk of the rules regulating the protection of personal privacy by federal agencies come from two laws, the Privacy Act of 1974 and the privacy provisions of …show more content…
Cookies can add positive attributes to online access, but only if the proper security and awareness is used in storing information in this way. Somethings to help to protect your PII when using cookies are as follows:
• Use a secure access to the internet, via WEP or WPA or VPN connections
• Never share your User Names and Passwords with others, use phases vs a single word or name as the base for your user name with varying additional characters added that differ for each website, vary your passwords and keep all information saved in a secure manner.
• Refrain from saving usernames and passwords for return use
• Only enter PII on a website if it is needed. Do not give information just because the website requests

Related Documents

  • Decent Essays

    1. Shred your documents. Don’t toss bank statements and credit card receipts in the trash. Dispose of them using a cross-cut shredder or shredding service. 2.…

    • 264 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    People that buy products or services online need to feel that their financial and personal information they have given to businesses is secure. Legal consequences of data privacy breaches: A company that stores personal data on their computers systems have a legal obligation to keep that data secure. If personal data is stolen during a cyber-attack and the company can be show to have been negligent in terms of keeping the personal data secure. Then the company could face prosecution under the Data Protection Act and receive a large fine. Malware With these the attacker can use malware to gain or change data malware is software specifically designed to gain access or damage a computer without the user from knowing there are various types of malware such:…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Most of us probably believe we have absolute freedom when it comes to what we view on the internet. However, Barbara van Schewick points out in her article ‘Network Neutrality Nuances’, that we only have access to bits and pieces of the internet (Schewick, 2009). What we are able to view is all decided upon by our ISP. Schewick states that ISPs select what we view in order to maximize profits, to ban content which they consider to be inappropriate, or to keep track of all signals on their network (Schewick, 2009). She does an excellent job of explaining why this is wrong by bringing forth real world examples, using thought-provoking literary devices, as well as by connecting with the reader (Schewick, 2009).…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cookie Research Paper

    • 448 Words
    • 2 Pages

    In your hand, you hold a cookie. You are really excited about this cookie. The perfect amount of softness and warmth and cookie-to-chip ratio. You never imagined you would have a cookie so fantastic -- so fantastic, in fact, that you don't want to eat it yet. So you're walking around with the cookie.…

    • 448 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cookie Inaccuracies

    • 350 Words
    • 2 Pages

    Some issues different people used same computer, Brower and user account will unavoidably share cookies. Cross-site cooking: Which help the attacker to set the cookie for a browser into the cookie domain of another site servers and attack the site itself.…

    • 350 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    There were many negative and positive effects that came from 9/11. Some of these effects only lasted for a short period of time to help protect and defend the American public. However, there were also many effects that have lasted for a long time. One of those effects is how the attacks have changed America's surveillance on their citizens. The Foreign Intelligence Surveillance Act (FISA), which was put into place in 1978 and allows the government to tap into citizen's electronics and monitor them for foreign intelligence information, has changed drastically since the events of 9/11.…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Americans had experienced this privacy invasion with the British many times. Before the revolution, British claimed the authority to issue Writs of Assistance allowing officials to enter private homes in search for evidence of smuggling. Writs of Assistance never expired and were transferable. The federalists violate the fourth amendment on a daily basis. When federal agency collects our electric data, emails, phone calls, and other private information, that violates this amendment, if they don’t have a legitimate reason.…

    • 590 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    According to the United Nations, privacy is basic human right that should be protected by law. The United States Constitution also implies a right to privacy in the Fourth Amendment. Recent laws passed by the government have raised questions about whether the government’s actions infringe upon a citizen’s right to privacy. The USA Patriot Act was the first of many laws that increased the powers of government organizations such as the NSA and the FBI. The law allowed these agencies to access private records of US citizens without the need of a warrant or judge’s consent.…

    • 716 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    This saves you from having to re-enter your data every time you visit. Cookies capture information that you don’t particularly know that’s being collected. This has its advantages and disadvantages. A cookie is a small text file saved on a customer's computer.…

    • 300 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Privacy Act was passed in 1974 and finally became effective on September 25 of 1975. This Act was mainly passed because of an outgrowth of Watergate reforms and also because of the rapid growth of technology such as computers. The main thing that this Act is known for is that it restricts the disclosure of personal records, much opposite of what the Freedom of Information Act does. “The purpose of the Privacy Act is to balance the government’s need to maintain information about individuals with the rights of individuals to be protected against unwarranted invasions of their privacy stemming from federal agencies’ collection, maintenance, use, and disclosure of personal information about them” (Justice Information, 2017). This Act focuses on restricting disclosure of personal records, give more rights to agency records, ability to see one’s own record if they show it is false and the fourth and final one is establish a code of fair information…

    • 1113 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Cookie Proliferation

    • 298 Words
    • 2 Pages

    Well it’s quite easy actually. Here are just a few threats that put our internet privacy at risk: Cookie proliferation: The invisible cookie software agents that track your browsing habits and personal data are likely to multiply in 2013. Advertising networks, marketers, and other data profiteers depend on cookies to learn more about who you are—and what you may be interested in buying. Unless legislation imposes legal restraints…

    • 298 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The 21st century is often referred to as the era of information. This is due to the radical amount of social networking that takes place on a day to day basis. This includes everything from Facebooking your close friends to googling answers for that last minute history assignment. Information is constantly being streamed onto the internet and it only takes a matter of seconds to go viral. The question is then raised, are privacy rights being violated and if so who is to blame?…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Right to Privacy In the world today privacy is a big problem people are having to deal with. The government has abused their power and in some cases, broken the law. Not just once, but a number of times and has lied about it and tried to sweep it under the rug as if no one was around. Government and politics are two wild animals who are related.…

    • 1450 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays