Skip to main content

Cookies: are they really a threat? - research essay introduction

Cookies: are they really a threat?

At present, Internet is flooded with requests to accept cookies, but it is worth to know what are cookies and why they suddenly emerged and instantly they are everywhere. Cookies are not a fresh invention - they were designed in 1994 and from the developer point of view they are special variables that are saved on client's device (Kaspersky, n.d.). Often within web applications data is saved in database for long-term bulk storage, in session files within server for short-term storage or as variables for runtime use only. All those three methods are using server resources to store and process data, therefore environment is fully controlled and secure. In opposition, cookies are stored on client device where data could be intercepted in transit or altered at rest, and it could be considered the least secure way to store data. Web authentication relays on three factors: something you know, something you have and something you are; and usually refers to passwords, token generating devices and biometrics respectively (Grassi, Garcia and Fenton, 2017). Cookies already fulfils one factor - something you have. Access to the device with saved cookie is already a form of authentication, and that fact is extensively helpful in secure web application design. Internet-based software saving data on user's device without need to have a consent undeniably affect user's privacy, but benefits from using cookies and security measurements within browsers and systems makes cookies mostly harmless and essential for modern applications. 

 

References:


Grassi, P., Garcia, M. and Fenton, J., 2017. Digital Identity Guidelines. Biometric Technology Today, [online] 2017(3), p.1. Available at: <https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf> [Accessed 5 May 2021].

Kaspersky, n.d. What are Cookies?. [online] www.kaspersky.com. Available at: <https://www.kaspersky.com/resource-center/definitions/cookies> [Accessed 28 April 2022].

Comments

Popular posts from this blog

Computer Ethics

The invention of computers was undeniably significant milestone for civilisation. Creation of that extensively versatile and multipurpose device was an advancement that commenced a new age - Information Age - in a history of humankind. However with new possibilities, new threats follows: cyber crime, cyber terrorism or cyber war. Computer ethics consists of rules, practices and areas that should be taken into consideration while designing, implementing and using information and communication technologies. It was a predecessor to ICT related legislation and expands current legal obligations for every individual involved.  The first of computer ethics commandments says: "Thou shalt not use a computer to harm other people".   Often ethic codes are assigned to activities that have potential to be unethical, and within computer sciences the first thought is majorly hacking. In general, hacking refers to activities leading to acquire access to systems or data without permission...