Chapter 6: Tracking and Surveillance Flashcards

(61 cards)

1
Q

What is UDP?

A

User Datagram Protocol

It is a protocol that sits on top of IP and is used to transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main difference between TCP and UDP?

A

TCP guarantees delivery, UDP does not

This allows UDP to transmit faster when speed is more important than reliability (for example, video streaming)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List 3 mail server protocols

A

Internet Message Access Protocol (IMAP)
Post Office Protocol (POP)
POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which mail server protocol erases data from the server once it is downloaded?

A

POP and POP3 (depending on configuration)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which method of sending data to a web server includes additional information in the URL? Get or Post?

A

Get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What part of a message is required to route it to the proper destination?

A

The IP header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do you call it when network hardware examines the full body of a message?

A

Deep packet inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of deep packet inspection?

A
  • Determine whether or not the packets contain malicious content
  • Help prevent data leaks (DLP)
  • Track users’ online behavior (advertisers)
  • Censor or track citizens’ online behaviors (government)
  • Allows network traffic and bandwidth shaping based on the content of a packet
  • Determine the type of content being sent from one host to another (to apply rate limits)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List 2 common attacks performed through Wi-Fi eavesdropping

A

Packet-sniffing systems

HTTP session hijacking or side-jacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List 4 Wi-Fi encryption schemes

A

WEP - Wired Equivalent Privacy
WPA - Wi-Fi Protected Access
WPA2
WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Wi-Fi encryption schemes are considered secure?

A

WPA2

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can spyware monitor user activities?

A

Capturing cookies to determine browsing history
Performing screen captures and transmitting images back to the attacker
Keylogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Does HTTPS provide anonymity?

A

No - network observers still can see the source and destination of traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are first-party cookies?

A

Those set by the primary page that the user is visiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are third-party cookies?

A

Cookies set from all companies other than the primary website whose URL is displayed in a browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are beacons or web bugs?

A

Elements used for tracking that are not visible to the user in the rendered web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the 2 types of cookies?

A

Session

Persistent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is URL rewriting?

A

Websites tracking the links a user clicks on a web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which technology can use a computers Media Access Control (MAC) address for tracking?

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What means of storage is used by the Adobe Flash plug-in?

A

Local Shared Objects (LSOs)

AKA Flash cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Where are LSOs stored?

A

On the hard drive, separate from HTTP cookies (so clicking clear cookies may not clear LSOs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How do many website respawn cookies?

A

They use LSOs to respawn deleted information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Internet Explorer has it’s own way of storing data on the local hard drive, this is called…

A

userData storage

Not cleared when cookies are deleted!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a pixel hack?

A

A unique identifier is written into a minuscule image, generated on the fly, in the form of the color values for one or more pixels
Since images are often cached, or stored locally by the browser to avoid having to download the resource again in the future, these tracking values can often be retrieved later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How does HTML5 store information locally?
``` Either Document Object Model (DOM) storage or web storage Session storage (for a browser window) ```
26
What is an entity tag?
``` Entity tags (ETags) are HTTP headers that allow a browser to permanently tag a previously viewed resource ETags are generally not deleted when a user clears their cookies; rather, ETags may be deleted when a user clears the browser’s cache ```
27
What is an Evercookie?
* In 2010, a security researcher prototyped a tracking mechanism, the “Evercookie,” designed to be extremely difficult to delete * The Evercookie combined multiple techniques, storing unique identifiers in more than ten different locations on a user’s computer * If data from one storage location were deleted, this data would be respawned from other locations
28
How can javascript identify links that a user has previously clicked?
Web browsers show links on a page that have already been visited in a different color JavaScript can access the color property
29
What is browser history stealing or sniffing?
An unscrupulous page can include thousands of invisible links to popular sites and then use JavaScript to query the color of those links and learn whether a particular page has been visited by the client browser
30
What is browser fingerprinting?
Leveraging the unique characteristics of an individual user’s browser—the fonts installed, the particular version of the browser running, the idiosyncrasies of a particular graphics card—as a semi-stable, unique identifier in place of cookies
31
How can images be used to confirm a user opened an email?
HTML code sent in an email to that user can request that content uniquely tied to that user be downloaded automatically from a remote server when the message is opened by the recipient
32
What 2 approaches do companies use to facilitate cross-device tracking?
Deterministic | Probalistic
33
Provide examples of how companies use probalistic matching to match users across devices
* Matching IP addresses | * Cookies, location and behavioral data
34
How does the Do Not Track (DNT) feature work in web browsers?
* HTTP header sent alongside requests for web content * Header can indicate that the user has requested not to be tracked * Does not actually block communication * Relies on companies to honor this request * Mostly a failure and abandoned
35
What is P3P?
* Platform for Privacy Preferences Project (P3P) tokens * Machine-readable language with which websites can express their privacy practices * The default setting in the Internet Explorer 6 through 10 web browsers blocked third-party cookies when they do not have P3P tokens and when they have P3P tokens indicating a privacy policy considered unsatisfactory by Microsoft’s criteria * IE is the only browser who used it * P3P not widely adopted by websites
36
Name 3 third-party browser extensions for privacy
* Disconnect * Ghostery * Privacy Badger
37
Name 2 general-purpose browser add-ons that can limit web tracking
* Adblock Plus (Firefox and Chrome) - blocks many advertisers * NoScript (Firefox) - disables JavaScript and Flash
38
What does Mozilla's Lightbeam tool do?
Presents a visualization of which third parties track users across particular websites
39
What is functional privacy?
Users’ willingness to aim for as much privacy as they can get without breaking the functionality of what they hope to accomplish
40
What privacy functionality does the DuckDuckGo browser offer?
Does not use HTTP cookies except to save preferences about the page layout a user has chosen, nor does it allow the HTTP Referer field to contain information about the search query
41
What privacy functionality does the TrackMeNot add-on in Firefox and Chrome offer?
Protects a user’s privacy by issuing decoy queries to major search engines
42
How are phone locations determined?
After determining the phone’s position relative to a handful of towers whose locations are known by the cellular provider, the position of the phone can then be determined geometrically through triangulation Wi-Fi signals a phone receives can help determine its location
43
Is location divulged when using GPS?
No, devices receive and do not transmit any signals in the GPS process, devices do not automatically reveal their location Though, a smartphone that determines its own location by receiving signals from GPS satellites might subsequently, and automatically, share that information with an app or the phone provider
44
What are the 2 RFID chip types?
* Passive | * Active
45
What is the main difference between passive and active RFID chips?
Active has its own power source, passive does not
46
How do RFIDs work?
The unique serial number associated with each RFID tag allows for location tracking If additional information is stored on the tag, the reader is also able to pick up that information
47
How can phones be located within buildings?
Receivers installed within the building complex
48
Why does the FCC require that phone location be trackable?
In case an emergency 911 call is placed
49
What is near-field communication (NFC)?
Technology that can support location-based advertising via radio waves when the phone is in close proximity
50
How can privacy be respected when dealing with location-tracking technologies?
* Should only be included when there is a direct benefit * Should be opt-in rather than opt-out * Users should be able to see what is stored about them and delete or update any past location data
51
What is a roving bug?
Remotely activated smartphone microphone
52
Who is allowed to use remotely activated cell phone-based audio surveillance?
FBI
53
What are Remote Access Trojans (RATs)?
Malware that allows an attacker to take control of the camera or microphone
54
What privacy issues exist with smart TVs?
* Voice commands are sent to remote servers for processing - this data could be compromised * Malware can repurpose the microphones into surveillance devices * Some smart televisions track what you watch
55
What is automated content recognition (ACR)?
Technology used by smart TVs to determine what the user is watching
56
Why is CCTV and Facial Recognition become such an important topic?
The increase in the number of cameras out there combined with advances in the accuracy of facial recognition
57
What privacy issues exist with voice over IP systems?
* Researchers have demonstrated that simply having access to the encrypted version of a message may be sufficient for using linguistic techniques to reconstruct the call if certain types of encryption are used * Metadata about a communication can often leak a large amount of the communication
58
What is ubiquitous computing (or ubicomp)?
Refers to the transition of computing from purpose-built, independent computing devices to computing that occurs at all times and in all places
59
What is a smart city?
Sometimes, the concept of a smart city refers to a city that aggregates and makes available existing data from its traditional functions in an open format and to all citizens The concept of a smart city is also used to describe cities that introduce large numbers of new sensors and actuators, adding computerized sensing and control to systems that did not previously have such capabilities • tracking devices on government-owned vehicles • automated license plate readers to track nongovernment vehicles similarly • Analytics for utility systems • Cameras for a multitude of reasons • Street corner sensors to detect environmental factors, gunshots or the movement of pedestrians
60
Why are accelerometers in smartphones a privacy risk?
* An accelerometer alone, even without persistent location awareness, can determine the distance traveled and therefore leak information about the user’s location relative to a previous position * It can also leak information about the passwords a user types into their phone
61
What is a major difficulty in communicating privacy information for IoT devices?
They often lack a user interface