Browse Definitions :
Definition

Web bug (Web beacon)

A Web bug, also known as a Web beacon, is a file object that is placed on a Web page or in an e-mail message to monitor user behavior.

Unlike a cookie, which can be accepted or declined by a browser user, a Web bug arrives as just another GIF or other file object. It can usually only be detected if the user looks at the source version of the page to find a tag that loads from a different Web server than the rest of the page.

Although proponents of Internet privacy object to the use of Web bugs in general, most concede that Web bugs can be put to positive use, for example to track copyright violations on the Web.

According to Richard M. Smith, a Web bug can gather the following statistics:

  • The IP address of the computer that fetched the Web bug.
  • The URL of the page that the Web bug is located on.
  • The URL of the Web bug.
  • The time the Web bug was viewed.
  • The type of browser that fetched the Web bug.
  • A previously set cookie value.

Web bugs are often used by spammers to validate e-mail addresses. When a recipient opens an email message that includes a Web bug, information returned to the sender indicates that the message has been opened, which confirms that the email address is valid.

This was last updated in July 2009

Continue Reading About Web bug (Web beacon)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close