Cookies are stored in user browsers by websites and are typically used to track a single user or to retain information needed between sessions. In this video, learn about the security and privacy risks associated with cookies and locally stored objects.
- [Narrator] You may have already heard of web cookies. These are small pieces of content that can track users between website visits and across different websites. Understanding the uses of cookies and how to remove them from a system is a critical task for privacy minded security administrators. Cookies are stored in user browsers by websites, and are typically used to track a single user or to retain information needed between sessions. There are some privacy risks associated with cookies, this is especially true when a cookie is used to track activity across multiple websites.
I can also go ahead and explore the content of any of these cookies. Most of them will be somewhat meaningless. These are just unique values that are used to identify me when I return to this website. If there's a cookie that I'd like to remove, I can remove it from my browser by simple clicking the X that appears to the right of each cookies. I could also click the remove all button to remove all of the cookies in my web browser. While web browsers are the most common place to find cookies, they're not the only cookies in use.
Looking for study partners?Join the CompTIA Security+ SY0-501 Exam study group
The CompTIA Security+ exam is an excellent entry point for a career in information security. The latest version, SY0-501, expands coverage of cloud security, virtualization, and mobile security. This course prepares exam candidates for the critical Threats, Attacks, and Vulnerabilities domain of the exam. By learning about malware, networking and application security exploitations, and social engineering, you'll be prepared to answer questions from the exam—and strengthen your own organization's systems and defenses. Author Mike Chapple, an IT leader with over 15 years of experience, also covers the processes for discovering and mitigating threats and attacks, and conducting penetration testing and scanning for vulnerabilities. Visit certmike.com to join one of his free study groups.
We are a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Comparing viruses, worms, and Trojans
- Backdoors and logic bombs
- Understanding the attacker
- Attack types: from denial of service to brute force attacks
- Preventing insider threats
- Wireless attacks
- Understanding cross-site scripting
- Preventing SQL injection
- Social engineering
- Scanning for vulnerabilities
- Penetration testing
- Assessing the impact of vulnerabilities