Information Technology Reference
In-Depth Information
you provide to online companies, so your personal habits may be
come known. Materials stored on your computer by browsers or by
yourself may provide further data regarding your transactions. You
should examine the privacy policies of companies, schools, and
Internet service providers to clarify how your personal data might
be used and what protections you might have.
Data traveling on the Internet typically moves along many seg
ments, so you should assume that any information you supply could
be intercepted and read by others. Encryption can provide a measure
of security for your data. This can help you if you use credit cards for
online transactions, but the use of credit cards on the Web is subject
to the same abuses as the use of these cards in stores. Risks for credit
card use rise when you cannot verify the identity of a company.
When your computer is connected to the World Wide Web,
there is some potential for outsiders to gain access to your materi
als. Firewalls, password protection, antivirus software, and the like
should provide reasonable security, although errors in software can
create opportunities for breaches in security. Wireless networks can
have somewhat higher risks, particularly if connections are not
password protected.
Terminology from This Chapter
Cookies
Decryption
Encryption
Foreign cookie
Form
Secure Hypertext
Transport
Protocol (HTTPS)
Secure Shell (ssh)
Thirdparty cookie
Uniform Resource
Locator (URL)
Web beacon
Web bug
Discussion Questions
1. Why do you think Uniform Resource Locator (URL) is the
name given to addresses we use in designating an item on the
World Wide Web?
a. What might be meant by “uniform” in this context?
b. Why might the word “resource” be used rather than docu
ment or file?
c. Why might one use the term “locator” rather than “loca
tion” or “address”?
Search WWH ::




Custom Search