Protecting Privacy

Total Page:16

File Type:pdf, Size:1020Kb

Protecting Privacy It Could Happen To You Protecting Privacy Tim Hoffman, MS, CISSP, ISP, C|EH, GCIH, ITIL, CCSK, CTT+, Security+… © Tim Hoffman & Associates, LLC 2020 Agenda o Community Changes Everything Overview – Qualifications o Privacy Right Laptop Lounge and Alida Connection o Top Threat of the Day: CYBER CRIME Privacy – What Is It ? o DARKNET FULLZ Google Search Right of Privacy – PERSONAL AUTONOMY o Staying Anonymous Good Old Days o Finding Information Our World Has Changed (I and II) Who Has Our Information: EVERYONE Social Media Addiction o We Give Our Data Away For Free o Identity Theft (Financial) Legal Residual Risks in Social Media o Identity Theft (Medical) o Let’s Get Technical © Tim Hoffman & Associates, LLC 2020 Overview - Qualifications President/CEO – Alida Connection Lead Information Security Engineer UCSF and for Center for Digital Health Innovation EVP ISSA Colorado Springs - Fellow Former US Navy Cryptologic Officer - part of the Intelligence Community Director of Threat at NSA spending time in Off-Line Crypto, Signals Intelligence/SIGSEC and Taught Electronic Warfare – Radio Fingerprinting – Mensuration Mensuration, a branch of mathematics that deals with measurement of various parameters of geometric figures Co-Author of technical series Network+ Certification Guide, TCP/IP for Windows NT 4.0, TCP/IP for Windows 2000, Microsoft Proxy Server 2.0, UBS Warburg Rollout Policy MS, CISSP, ISP, C|EH, GCIH, ITIL, CCSK, CTT+, Security+… © Tim Hoffman & Associates, LLC 2020 Laptop Lounge and the Alida Connection This presentation will not: Make you thinner. Put $12,000,000 in your bank account. Help you find the LOVE of your life. If you are receiving many advertisements in email for Cialis and Viagra – this discussion may be for you. © Tim Hoffman & Associates, LLC 2020 PRIVACY – What Is It? Privacy (from Latin: privatus) is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. When something is private to a person, it usually means there is something to them inherently special or sensitive. The domain of privacy partially overlaps security, including for instance the concepts of appropriate use, as well as protection of information. Privacy may also take the form of bodily integrity. Privacy may be voluntarily sacrificed, normally in exchange for perceived benefits and very often with specific dangers and losses, although this is a very strategic view of human relationships. In the business world, a person may volunteer personal details (often for advertising purposes) in order to gamble on winning a prize. Personal information which is voluntarily shared but subsequently stolen or misused can lead to identity theft. © Tim Hoffman & Associates, LLC 2020 Right of Privacy: PERSONAL AUTONOMY The right of privacy has evolved to protect the freedom of individuals to choose whether or not to perform certain acts or subject themselves to certain experiences. This personal autonomy has grown into a 'liberty' protected by the Due Process Clause of the 14th Amendment. This liberty is narrowly defined and generally only protects privacy of family, marriage, motherhood, procreation, and child rearing. There have been attempts to further extend the right of privacy under other Amendments (1st, 4th, and 5th) to the U.S. Constitution; however, a general right to personal autonomy has yet to take hold beyond limited circumstances. Source: Cornell Law In the 1940s we assumed everyone was honest – good citizens. What are our assumptions today? © Tim Hoffman & Associates, LLC 2020 Good Old Days Those who cannot remember the past are condemned to repeat it. Analogy - SLOW - versus - FAST - and LOCAL versus GLOBAL. Investigations - Information Collection - Step-by-Step Privacy by Design – everything was local – so choices were limited Data was collected and used locally A background check for Government work was a lengthy process – one element at a time. Local Agency Check (Police Records) – National Agency Check (ENT – NAC or NAC) SBI – SSBI and beyond (nuclear programs etc.) Name – Address – Phone – Family & Relatives – Mother’s Maiden Name - SSN – DOB – Past Addresses – Place of Employment – Real Property – Marriage – Divorce – Voter Registration – Civil Court and Public Filings – Permits – Licenses – Church Affiliations – Tax Filing – Donations – Credit Report – Credit Cards – Phone Bills – © Tim Hoffman & Associates, LLC 2020 Our World Has Changed Computing Power (speed, hard drive storage and memory) Everyone has a cell phone / smart phone Everything is immediate and digital - Travel, Medical records, Credit Card Department of Homeland Security save 75 years of exit and entry to the US Google – stores 100 Years of every Newspaper in the US Every Twitter tweet turned over to the Library of Congress Optical Character Readers can scan thousands of sheets every day Google mapped every WI-FI node in North America Creation of new Search Models and new video to text - translators Precision Target Marketing – merchants want to sell stuff © Tim Hoffman & Associates, LLC 2020 Our World Has Changed There is no forgetting – everything you have ever done Every Rant – post – picture – ticket – newsgroup – telephone call and Every Bit and Byte of Activity Everything is forever cached – indexed – and stored for posterity No privacy any more – no shame – LinedIn – Name Address Phone Sexual Orientation What you did last night – life casting – real reality Where you are going on vacation (and your children) Blippy.com – putting your entire set of purchases online GPS is always on – Everyone wants to know everything about you Augmented Reality (facial recognition – building - landmark recognition) Picasa now has Built in Facial Recognition Tag everything – right ? © Tim Hoffman & Associates, LLC 2020 Social Media Addiction © Tim Hoffman & Associates, LLC 2020 We Give Our Data Away For Free Before computers were used as primary tools - people used anonymity to protect their privacy. Are you anonymous today? No - today anonymity is close to non-existent for anyone alive. Cyber crime is increasing exponentially – Nation State Sponsored. Once you give your data to a company who does it belong to? What’s in your account? Facebook Google Drive Identify theft is rampant. Twitter AWS (Amazon) Ever tried to delete? Tumblr Azure (Microsoft) Foursquare Box Look at Wayback at Pinterest DROPBOX archive.org Shutterfly iCloud © Tim Hoffman & Associates, LLC 2020 Instagram … Community Changes Everything Today – Everyone has a megaphone The end of Forgetting is here – all communications are permanent and indelible Data points exist on everything that is put online in any format Social media means: Everyone talks Everyone listens Everyone remembers EVERYTHING ! The line between personal and professional – private and public is a BLUR ! Social media creates both internal and external legal risks that did not exist before. © Tim Hoffman & Associates, LLC 2020 Legal Residual Risks in Social Media Disclosure of RESTRICTED (Confidential/SECRET) information Trademark Infringement Copyright Infringement Defamation E-Discovery Endorsements Privacy and Publicity RIGHTS HR Issues © Tim Hoffman & Associates, LLC 2020 Privacy Right Privacy is one of the most widely sought of rights and among rights most valued The TO DO LIST: Consider what you reveal about personal details to strangers or just-met “friends” (think social engineering) Beware of web sites that offer rewards and prizes Be aware of home computer and device security Examine privacy policies Use encryption everywhere possible (look for the lock) The NOT DO LIST: Do not reveal personal information inadvertently Do not reply to spammers - for any reason © Tim Hoffman & Associates, LLC 2020 Top Threat of the Day: CYBER CRIME In the evolution of CYBER CRIME - In days past – Perhaps a teenager or a couple friends got together with some energy drinks or a Mountain Dew and set out to find a web server with vulnerabilities they could exploit for fun. Cyber Crime Today – Lone criminal is still out there but the predominant form of threat is the organized group of cyber criminals who are intent on hacking for profit. Many of the groups that do this are made up of highly skilled professionals who seek financial gains. Credit cards are worth a dollar ($1) each Medical Record with some history is worth up to $214 (Ponemon Institute) © Tim Hoffman & Associates, LLC 2020 DARKNET FULLZ Google Search Hello I'm hacker and seller and I offer stuff for serious carders. If you need CVV or ***** (track1/track2 original), or something else I will be glad to help you. Always in stock Us , EU , UK , CN database of *****, COB's, Full Info, CVV's... ***** - include original track1/track2, also have some ***** with card holder info (ZIP , SSN , MMN , CVV2) CVVs - include CC#, CVV2, EXP.DATE, full name, full address. My service is well-known, and verified at carding forums. I am a verified seller at these sites: Netcarding.ru OffCarding DarkNet CardingWorld I do shopping to any address in US and UK,I shop iphones,laptops,perfums and more,Laptop is 100$,Iphone is 100$,Normal phone is 80$............. Come for more deal Contact me if u want buy: sellcvv_good14 1 Visa card..........3$ 1 master card..........3$ 1 amex card..........5$ 1 Dicover card..........5$ 1 Company card..........8$ 1 Uk Card Nornal CC..........5$ 1 Uk Card With DOB ..........20$ 1 Track 1& 2 CC..........30$
Recommended publications
  • Metadata for Semantic and Social Applications
    etadata is a key aspect of our evolving infrastructure for information management, social computing, and scientific collaboration. DC-2008M will focus on metadata challenges, solutions, and innovation in initiatives and activities underlying semantic and social applications. Metadata is part of the fabric of social computing, which includes the use of wikis, blogs, and tagging for collaboration and participation. Metadata also underlies the development of semantic applications, and the Semantic Web — the representation and integration of multimedia knowledge structures on the basis of semantic models. These two trends flow together in applications such as Wikipedia, where authors collectively create structured information that can be extracted and used to enhance access to and use of information sources. Recent discussion has focused on how existing bibliographic standards can be expressed as Semantic Metadata for Web vocabularies to facilitate the ingration of library and cultural heritage data with other types of data. Harnessing the efforts of content providers and end-users to link, tag, edit, and describe their Semantic and information in interoperable ways (”participatory metadata”) is a key step towards providing knowledge environments that are scalable, self-correcting, and evolvable. Social Applications DC-2008 will explore conceptual and practical issues in the development and deployment of semantic and social applications to meet the needs of specific communities of practice. Edited by Jane Greenberg and Wolfgang Klas DC-2008
    [Show full text]
  • Natural Language Processing Technique for Information Extraction and Analysis
    International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 8, August 2015, PP 32-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Natural Language Processing Technique for Information Extraction and Analysis T. Sri Sravya1, T. Sudha2, M. Soumya Harika3 1 M.Tech (C.S.E) Sri Padmavati Mahila Visvavidyalayam (Women’s University), School of Engineering and Technology, Tirupati. [email protected] 2 Head (I/C) of C.S.E & IT Sri Padmavati Mahila Visvavidyalayam (Women’s University), School of Engineering and Technology, Tirupati. [email protected] 3 M. Tech C.S.E, Assistant Professor, Sri Padmavati Mahila Visvavidyalayam (Women’s University), School of Engineering and Technology, Tirupati. [email protected] Abstract: In the current internet era, there are a large number of systems and sensors which generate data continuously and inform users about their status and the status of devices and surroundings they monitor. Examples include web cameras at traffic intersections, key government installations etc., seismic activity measurement sensors, tsunami early warning systems and many others. A Natural Language Processing based activity, the current project is aimed at extracting entities from data collected from various sources such as social media, internet news articles and other websites and integrating this data into contextual information, providing visualization of this data on a map and further performing co-reference analysis to establish linkage amongst the entities. Keywords: Apache Nutch, Solr, crawling, indexing 1. INTRODUCTION In today’s harsh global business arena, the pace of events has increased rapidly, with technological innovations occurring at ever-increasing speed and considerably shorter life cycles.
    [Show full text]
  • United States Patent (19) 11 Patent Number: 6,094,649 Bowen Et Al
    US006094649A United States Patent (19) 11 Patent Number: 6,094,649 Bowen et al. (45) Date of Patent: Jul. 25, 2000 54) KEYWORD SEARCHES OF STRUCTURED “Charles Schwab Broadens Deployment of Fulcrum-Based DATABASES Corporate Knowledge Library Application', Uknown, Full 75 Inventors: Stephen J Bowen, Sandy; Don R crum Technologies Inc., Mar. 3, 1997, pp. 1-3. Brown, Salt Lake City, both of Utah (List continued on next page.) 73 Assignee: PartNet, Inc., Salt Lake City, Utah 21 Appl. No.: 08/995,700 Primary Examiner-Hosain T. Alam 22 Filed: Dec. 22, 1997 Assistant Examiner Thuy Pardo Attorney, Agent, or Firm-Computer Law---- (51) Int. Cl." ...................................................... G06F 17/30 52 U.S. Cl. ......................................... 707/3; 707/5; 707/4 (57 ABSTRACT 58 Field of Search .................................... 707/1, 2, 3, 4, 707/5, 531, 532,500 Methods and Systems are provided for Supporting keyword Searches of data items in a structured database, Such as a 56) References Cited relational database. Selected data items are retrieved using U.S. PATENT DOCUMENTS an SQL query or other mechanism. The retrieved data values 5,375,235 12/1994 Berry et al. ................................. is are documented using a markup language such as HTML. 5,469,354 11/1995 Hatakeyama et al. ... 707/3 The documents are indexed using a web crawler or other 5,546,578 8/1996 Takada ................. ... 707/5 indexing agent. Data items may be Selected for indexing by 5,685,003 11/1997 Peltonen et al. .. ... 707/531 5,787.295 7/1998 Nakao ........... ... 707/500 identifying them in a data dictionary. The indexing agent 5,787,421 7/1998 Nomiyama ..
    [Show full text]
  • A Comparison of Information Seeking Using Search Engines and Social Networks
    A Comparison of Information Seeking Using Search Engines and Social Networks Meredith Ringel Morris1, Jaime Teevan1, Katrina Panovich2 1Microsoft Research, Redmond, WA, USA, 2Massachusetts Institute of Technology, Cambridge, MA, USA {merrie, teevan}@microsoft.com, [email protected] Abstract et al. 2009 or Groupization by Morris et al. 2008). Social The Web has become an important information repository; search engines can also be devised using the output of so- often it is the first source a person turns to with an informa- cial tagging systems such as delicious (delicious.com). tion need. One common way to search the Web is with a Social search also encompasses active requests for help search engine. However, it is not always easy for people to from the searcher to other people. Evans and Chi (2008) find what they are looking for with keyword search, and at describe the stages of the search process when people tend times the desired information may not be readily available to interact with others. Morris et al. (2010) surveyed Face- online. An alternative, facilitated by the rise of social media, is to pose a question to one‟s online social network. In this book and Twitter users about situations in which they used paper, we explore the pros and cons of using a social net- a status message to ask questions of their social networks. working tool to fill an information need, as compared with a A well-studied type of social searching behavior is the search engine. We describe a study in which 12 participants posting of a question to a Q&A site (e.g., Harper et al.
    [Show full text]
  • 1.3.4 Web Technologies Concise Notes
    OCR Computer Science A Level 1.3.4 Web Technologies Concise Notes www.pmt.education Specification 1.3.4 a) ● HTML ● CSS ● JavaScript 1.3.4 b) ● Search engine indexing 1.3.4 c) ● PageRank algorithm 1.3.4 d) ● Server and Client side processing www.pmt.education Web Development HTML ● HTML is the language/script that web pages are written in, ​ ​ ​ ​ ● It allows a browser to interpret and render a webpage for the viewer by describing ​ ​ ​ ​ the structure and order of the webpage. ​ ​ ● The language uses tags written in angle brackets (<tag>, </tag>) there are two ​ ​ sections of a webpage, a body and head. HTML Tags ● <html> : all code written within these tags is interpreted as HTML, ● <body> :Defines the content in the main browser content area, ● <link> :this is used to link to a css stylesheet (explained later in the notes) ● <head> :Defines the browser tab or window heading area, ● <title> :Defines the text that appears with the tab or window heading area, ● <h1>, <h2>, <h3> :Heading styles in decreasing sizes, ​ ​ ​ ​ ● <p> :A paragraph separated with a line space above and below ● <img> :Self closing image with parameters (img src = location, height=x, width = y) ● <a> : Anchor tag defining a hyperlink with location parameters (<a href= location> link text </a>) ● <ol> :Defines an ordered list, ● <ul> :Defines an unordered list, ● <li> :defines an individual list item ● <div> :creates a division of a page into separate areas each which can be referred to uniquely by name, (<div id= “page”>) Classes and Identifiers ● Class and identifier selectors are the names which you style, this means groups of items can be styled, the selectors for html are usually the div tags.
    [Show full text]
  • An Innovative Video Searching Approach Using Video Indexing
    IJCSN - International Journal of Computer Science and Network, Volume 8, Issue 2, April 2019 ISSN (Online) : 2277-5420 www.IJCSN.org Impact Factor: 1.5 An Innovative Video Searching Approach using Video Indexing 1 Jaimon Jacob; 2 Sudeep Ilayidom; 3 V.P.Devassia [1] Department of Computer Science and Engineering, Govt. Model Engineering College, Thrikkakara, Ernakulam,Kerala,, India,682021 [2] Division of Computer Engineering, School of Engineering, Cochin University of Science and Technology, Thrikkakara, Ernakulam, Kerala,, India,682022 [3] Former Principal, Govt. Model Engineering College, Thrikkakara, Ernakulam,Kerala,, India,682021 Abstract - Searching for a Video in World Wide Web has augmented expeditiously as there’s been an explosion of growth in video on social media channels and networks in recent years. At present video search engines use the title, description, and thumbnail of the video for identifying the right one. In this paper, a novel video searching methodology is proposed using the Video indexing method. Video indexing is a technique of preparing an index, based on the content of video for the easy access of frames of interest. Videos are stored along with an index which is created out of video indexing technique. The video searching methodology check the content of index attached with each video to ensure that video is matching with the searching keyword and its relevance ensured, based on the word count of searching keyword in video index. The video searching methodology check the content of index attached with each video to ensure that video is matching with the searching keyword and its relevance ensured, based on the word count of searching keyword in video index.
    [Show full text]
  • SEO-A Review Sonu B
    International Journal of Research and Scientific Innovation (IJRSI) | Volume V, Issue II, February 2018 | ISSN 2321–2705 SEO-A Review Sonu B. Surati, Ghanshyam I. Prajapati Department of Information Technology, Shri S’ad Vidya Mandal Institute of Technology, Bharuch, Gujarat, India Abstract— Search Engine Optimization (SEO) is the process of affecting online visibility of a website or web page. This is important to improve rank of search result for website and get more page views, which are requested by user and these users can be converted into customers. A Search Engine Optimization may target on different search engines like image, video, academic, news, industry etc. and using these engine ranks they provide better and optimized result for user. These ranks help them to view popular page among the number of page available in the (non-paid) search result. Also, SEO is to help website managers to improve traffic of website, to making site friendly, to building link, and marketing unique value of site. SEO classified in two categories as either white hat SEO or black hat SEO. White hats tend to produce results that last a long time, whereas black hats anticipate that their sites may eventually be banned either temporarily or permanently. SEO is used to improve their frames and create more economic effectiveness and social effectiveness and also they can focus on national and international searcher(s). Keywords— Search Engine Optimization, White Hat, Black Hat, Link- Building, Marketing, Website, Social Sharing, Ranking. I. INTRODUCTION Fig.1 History of SEO search engine is software that is designed to search for So using cluster k- means algorithm solve delay problems, A information on World Wide Web.
    [Show full text]
  • A Method for a Small Web Site to Add Some Video Sharing Features
    LiU-ITN-TEK-A--08/013--SE A method for a small web site to add some video sharing features Juan Lucas Madurga Martín-Serrano 2008-01-31 Department of Science and Technology Institutionen för teknik och naturvetenskap Linköping University Linköpings Universitet SE-601 74 Norrköping, Sweden 601 74 Norrköping LiU-ITN-TEK-A--08/013--SE A method for a small web site to add some video sharing features Examensarbete utfört i datavetenskap vid Tekniska Högskolan vid Linköpings unversitet Juan Lucas Madurga Martín-Serrano Examinator Bengt Lennartsson Norrköping 2008-01-31 Upphovsrätt Detta dokument hålls tillgängligt på Internet – eller dess framtida ersättare – under en längre tid från publiceringsdatum under förutsättning att inga extra- ordinära omständigheter uppstår. Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner, skriva ut enstaka kopior för enskilt bruk och att använda det oförändrat för ickekommersiell forskning och för undervisning. Överföring av upphovsrätten vid en senare tidpunkt kan inte upphäva detta tillstånd. All annan användning av dokumentet kräver upphovsmannens medgivande. För att garantera äktheten, säkerheten och tillgängligheten finns det lösningar av teknisk och administrativ art. Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsman i den omfattning som god sed kräver vid användning av dokumentet på ovan beskrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådan form eller i sådant sammanhang som är kränkande för upphovsmannens litterära eller konstnärliga anseende eller egenart. För ytterligare information om Linköping University Electronic Press se förlagets hemsida http://www.ep.liu.se/ Copyright The publishers will keep this document online on the Internet - or its possible replacement - for a considerable time from the date of publication barring exceptional circumstances.
    [Show full text]
  • A Federated Search and Social Recommendation Widget
    A Federated Search and Social Recommendation Widget Sten Govaerts1 Sandy El Helou2 Erik Duval3 Denis Gillet4 Dept. Computer Science1,3 REACT group2,4 Katholieke Universiteit Leuven Ecole Polytechnique Fed´ erale´ de Lausanne Celestijnenlaan 200A, Heverlee, Belgium 1015 Lausanne, Switzerland fsten.govaerts1, [email protected] fsandy.elhelou2, denis.gillet4g@epfl.ch ABSTRACT are very useful, but their generality can sometimes be an ob- This paper presents a federated search and social recommen- stacle and this can make it difficult to know where to search dation widget. It describes the widget’s interface and the un- for the needed information [2]. Federated searching over derlying social recommendation engine. A preliminary eval- collections of topic-specific repositories can assist with this uation of the widget’s usability and usefulness involving 15 and save time. When the user sends a search request, the subjects is also discussed. The evaluation helped identify us- federated search widget collects relevant resources from dif- ability problems that will be addressed prior to the widget’s ferent social media sites [3], repositories and search engines. usage in a real learning context. Before rendering aggregated results, the widget calls a per- sonalized social recommendation service deemed as crucial Author Keywords in helping users select relevant resources especially in our federated search, social recommendations, widget, Web, per- information overload age [4,5]. The recommendation ser- sonal learning environment (PLE), Pagerank, social media, vice ranks these resources according to their global popu- Web 2.0 larity and most importantly their popularity within the social network of the target user. Ranks are computed by exploiting attention metadata and social networks in the widget.
    [Show full text]
  • Unicorn: a System for Searching the Social Graph
    Unicorn: A System for Searching the Social Graph Michael Curtiss, Iain Becker, Tudor Bosman, Sergey Doroshenko, Lucian Grijincu, Tom Jackson, Sandhya Kunnatur, Soren Lassen, Philip Pronin, Sriram Sankar, Guanghao Shen, Gintaras Woss, Chao Yang, Ning Zhang Facebook, Inc. ABSTRACT rative of the evolution of Unicorn's architecture, as well as Unicorn is an online, in-memory social graph-aware index- documentation for the major features and components of ing system designed to search trillions of edges between tens the system. of billions of users and entities on thousands of commodity To the best of our knowledge, no other online graph re- servers. Unicorn is based on standard concepts in informa- trieval system has ever been built with the scale of Unicorn tion retrieval, but it includes features to promote results in terms of both data volume and query volume. The sys- with good social proximity. It also supports queries that re- tem serves tens of billions of nodes and trillions of edges quire multiple round-trips to leaves in order to retrieve ob- at scale while accounting for per-edge privacy, and it must jects that are more than one edge away from source nodes. also support realtime updates for all edges and nodes while Unicorn is designed to answer billions of queries per day at serving billions of daily queries at low latencies. latencies in the hundreds of milliseconds, and it serves as an This paper includes three main contributions: infrastructural building block for Facebook's Graph Search • We describe how we applied common information re- product. In this paper, we describe the data model and trieval architectural concepts to the domain of the so- query language supported by Unicorn.
    [Show full text]
  • Exploring Search Engine Optimization (SEO) Techniques for Dynamic Websites
    Master Thesis Computer Science Thesis no: MCS-2011-10 March, 2011 __________________________________________________________________________ Exploring Search Engine Optimization (SEO) Techniques for Dynamic Websites Wasfa Kanwal School of Computing Blekinge Institute of Technology SE – 371 39 Karlskrona Sweden This thesis is submitted to the School of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Computer Science. The thesis is equivalent to 20 weeks of full time studies. ___________________________________________________________________________________ Contact Information: Author: Wasfa Kanwal E-mail: [email protected] University advisor: Martin Boldt, PhD. School of Computing School of Computing Internet : www.bth.se/com Blekinge Institute of Technology Phone : +46 455 38 50 00 SE – 371 39 Karlskrona Fax : +46 455 38 50 57 Sweden ii ABSTRACT Context: With growing number of online businesses, Search Engine Optimization (SEO) has become vital to capitalize a business because SEO is key factor for marketing an online business. SEO is the process to optimize a website so that it ranks well on Search Engine Result Pages (SERPs). Dynamic websites are commonly used for e-commerce because they are easier to update and expand; however they are subjected to indexing related problems. Objectives: This research aims to examine and address dynamic websites indexing related issues. To achieve aims and objectives of this research I intend to explore dynamic websites indexing considerations, investigate SEO tools to carry SEO campaign in three major search engines (Google, Yahoo and Bing), experiment SEO techniques, and determine to what extent dynamic websites can be made search engine friendly on these major search engines.
    [Show full text]
  • Check out Our Initial Report Example Here
    CGAIN CITATION BUILDING SERVICE CLIENT INFORMATION SHEET REQUIRED BUSINESS INFORMATION BUSINESS NAME : CGain Web Design & SEO BUSINESS OWNER'S NAME : Chris Giles BUSINESS ADDRESS 1 : Millennium House BUSINESS ADDRESS 2 : 161 Mowbray Drive CITY : Blackpool STATEPROVINCE : Lancashire ZIPPOSTAL CODE : FY3 7UN COUNTRY : United Kingdom MAIN PHONE # : 01253 675593 WEBSITE URL : hPps://www.cgain.co.uk BUSINESS EMAIL : [email protected] OTHER BUSINESS INFORMATION TOLL FREE PHONE # : MOBILE # : 07518 931616 FAX # : BUSINESS HOURS : 7 days, 9am to 10pm PAYMENT ACCEPTED : Cash, BACS, Paypal, Visa, Mastercard BUSINESS CATEGORY : Web & SEO Agency SERVICE AREA : United Kingdom KEYWORD(s) : seo, web design, website design, search engine op[misa[on SERVICES : Web design, web development, seo PRODUCT(s) : LOGO URL : hPps://www.cgain.co.uk/wp-content/uploads/2019/10/650x520.jpg hPps://www.cgain.co.uk/wp-content/uploads/2020/06/owllegal-website.jpg, hPps:// www.cgain.co.uk/wp-content/uploads/2020/06/weelz_.jpg,hPps://www.cgain.co.uk/wp- content/uploads/2020/06/mobility-scooters-blackpool.jpg,hPps://www.cgain.co.uk/wp- IMAGE URL(s) : content/uploads/2020/06/quickcrepesburnley.jpg,hPps://www.cgain.co.uk/wp-content/ uploads/2019/03/fleet-equestrian-website-2018.jpg,https://www.cgain.co.uk/ wp-content/uploads/2019/03/magellan.jpg SHORT BUSINESS BIO : CGain Web Design Blackpool provide class-leading, mobile-friendly, responsive and fully op[mised websites for clients of all sizes. We have been developing successful websites since 1995. Our work has covered websites for small local businesses right up to interna[onal human rights organisa[ons. Every website is different, honed to reflect our clients’ exis[ng branding or designed from scratch.
    [Show full text]