Internet Business Foundations © 2004 ProsoftTraining All rights reserved.

Slides:



Advertisements
Similar presentations
The Internet and the Web
Advertisements

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 13: Administering Web Resources.
Lesson 4: Web Browsing.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8: Protecting Yourself Online.
Unit 12 Using the Internet & Browsing the Web.  Understand the difference between the Internet and the World Wide Web  Identify items on a web page.
Lesson 8: Protecting Yourself Online. Lesson 8 Objectives  Discuss "The Right to Be Forgotten"  Identify ways to minimize the spam you receive  Define.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 13: Administering Web Resources.
How Clients and Servers Work Together. Objectives Web Server Protocols Examine how server and client software work Use FTP to transfer files Initiate.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
The Internet and the World Wide Web. Una DooneyThe Internet and WWWSlide 2 What is the Internet? A collection of networks (LANS and WANS) around the world.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Introduction 2: Internet, Intranet, and Extranet J394 – Perancangan Situs Web Program Sudi Manajemen Universitas Bina Nusantara.
The Internet 8th Edition Tutorial 1 Browser Basics.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Remote Networking Architectures
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
CSCI 6962: Server-side Design and Programming
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
Course 201 – Administration, Content Inspection and SSL VPN
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Session 11: Security with ASP.NET
Chapter 7: Using Windows Servers to Share Information.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Lesson 2 — The Internet and the World Wide Web
1 Computer Communication & Networks Lecture 28 Application Layer: HTTP & WWW p Waleed Ejaz
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 13: Administering Web Resources.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8 Protecting Yourself Online.
Module 9: Fundamentals of Securing Network Communication.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
1 World Wide Web Concepts (Chapter 18) 인공지능연구실. 2 목 차  Elements of the Web  Web Browsers  Keeping Tracking of your Favorite Web sites  Security and.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
WEB SERVER SOFTWARE FEATURE SETS
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Information Networks. Internet It is a global system of interconnected computer networks that link several billion devices worldwide. It is an international.
+ CIW LESSON 4 Web Browsers. + Basic Functions of Web Browsers Provide a way for users to access and navigate Web pages Display Web pages properly Provide.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
1 Lesson 28 Using the Internet and the World Wide Web Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Technologies and Applications
Lesson 4: Web Browsing.
Warm Handshake with Websites, Servers and Web Servers:
Evolution of Internet.
Unit 12 Using the Internet & Browsing the Web
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 13: Administering Web Resources.
Web Page Concept and Design :
Lesson 4: Web Browsing.
Electronic Payment Security Technologies
Presentation transcript:

Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Lesson 2: Web Browsing

Objectives Identify the basic functions of Web browsers Identify the basic functions of Web browsers Install a Web browser Install a Web browser Identify the components of Web addresses Identify the components of Web addresses Use browsers to authenticate and encrypt Use browsers to authenticate and encrypt Identify considerations in selecting a browser Identify considerations in selecting a browser Identify and locate resources for technical data Identify and locate resources for technical data Identify how businesses use browsers Identify how businesses use browsers Use various browsing techniques Use various browsing techniques Configure Web browser preferences Configure Web browser preferences Define and use cookies Define and use cookies Configure browser security settings Configure browser security settings Identify the function of proxy servers Identify the function of proxy servers Troubleshoot common Internet client problems Troubleshoot common Internet client problems

Basic Functions of Web Browsers Provide a way for users to access and navigate Web pages Provide a way for users to access and navigate Web pages Display Web pages properly Display Web pages properly Provide technology to enable multimedia features Provide technology to enable multimedia features Provide access to Internet services (such as FTP, Telnet, news servers and ) Provide access to Internet services (such as FTP, Telnet, news servers and ) Perform authentication and encryption functions Perform authentication and encryption functions

Installing a Web Browser Microsoft Internet Explorer 6.0 is packaged with Windows XP Professional Microsoft Internet Explorer 6.0 is packaged with Windows XP Professional Most browser software is available on the Web or through a vendor CD Most browser software is available on the Web or through a vendor CD ISPs provide browser software on installation CD- ROMs ISPs provide browser software on installation CD- ROMs You should install the latest version of a browser because it will have the most recent security features You should install the latest version of a browser because it will have the most recent security features Look for and install browser updates as they become available Look for and install browser updates as they become available

Web Addresses Every Web page has a unique address called a URL Every Web page has a unique address called a URL URLs typically include the protocol, the Internet resource (server or host name) and the domain name URLs typically include the protocol, the Internet resource (server or host name) and the domain name You enter absolute URLs into your browser’s Address or Location box You enter absolute URLs into your browser’s Address or Location box Relative URLs can be used for coding Web sites Relative URLs can be used for coding Web sites

How Browsers Work 1. You enter a URL into the browser 2. Browser breaks the URL into three parts: protocol, server and domain name, and file name 3. Browser contacts a domain name server to translate server name into an IP address 4. Browser uses IP address to connect to server 5. Browser uses HTTP to request a page from the server 6. Some level of authentication takes place 7. Server sends the requested page (coded in HTML) to the browser 8. Browser reads and interprets the HTML and displays the Web page

Authentication Authentication – the process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data Authentication – the process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data General authentication types: General authentication types: Anonymous logon – no user name or password is required and authentication is handled transparently by the browser and serverAnonymous logon – no user name or password is required and authentication is handled transparently by the browser and server Basic authentication – a user name and password are required, and that information is sent as plain textBasic authentication – a user name and password are required, and that information is sent as plain text Secure authentication – a user name and password are required, and they are encrypted before being sent across the InternetSecure authentication – a user name and password are required, and they are encrypted before being sent across the Internet Digital certificates – you must have the proper digital certificate to gain accessDigital certificates – you must have the proper digital certificate to gain access

Encryption Encryption – the process of converting data into an unreadable form of text Encryption – the process of converting data into an unreadable form of text Decryption – the process of converting the encrypted data back to its original form Decryption – the process of converting the encrypted data back to its original form Encryption and decryption are performed using keys Encryption and decryption are performed using keys Key – a mathematical algorithm Key – a mathematical algorithm The more complex the encryption algorithm, the harder it is to decipher the encrypted message without access to the key The more complex the encryption algorithm, the harder it is to decipher the encrypted message without access to the key

Authentication protocols Password Authentication Protocol (PAP) – used to authenticate dial-up sessions for remote users Password Authentication Protocol (PAP) – used to authenticate dial-up sessions for remote users Challenge Handshake Authentication Protocol (CHAP) – authenticates through a server sending a challenge phrase to a client and comparing the client response (generated through a one-way hash function) with its own calculation of the expected hash value Challenge Handshake Authentication Protocol (CHAP) – authenticates through a server sending a challenge phrase to a client and comparing the client response (generated through a one-way hash function) with its own calculation of the expected hash value Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) – a proprietary version of CHAP used by servers running IIS Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) – a proprietary version of CHAP used by servers running IIS

SSL and TLS Secure Sockets Layer (SSL) – a protocol for secure exchanges Secure Sockets Layer (SSL) – a protocol for secure exchanges authenticates using digital certificatesauthenticates using digital certificates provides for data encryptionprovides for data encryption Transport Layer Security (TLS) – successor to SSL Transport Layer Security (TLS) – successor to SSL becoming more commonbecoming more common based on SSL 3.0based on SSL 3.0 provides for encryption and authenticationprovides for encryption and authentication

Secure Protocols Various protocols in the TCP/IP suite can be made secure by running them over SSL/TLS, including: HTTPSHTTPS S/FTPS/FTP IMAP/SIMAP/S POP3SPOP3S

Browser Choices Most popular browsers in use today are Microsoft Internet Explorer and Netscape Navigator Most popular browsers in use today are Microsoft Internet Explorer and Netscape Navigator Alternative browsers include: Alternative browsers include: MozillaMozilla OperaOpera KonquerorKonqueror LynxLynx ArachneArachne

Resources for Technical Data The following Web sites are among the many you can visit for technical data:

Business Uses of Browsers intranet – an internal or in-house Web site used only by employees within a company intranet – an internal or in-house Web site used only by employees within a company extranet – an internal network designed to provide access to selected external users; is not available to the Internet public extranet – an internal network designed to provide access to selected external users; is not available to the Internet public Webinars and Web conferences – online training or conference sessions that utilize Internet technology to provide interactive and presentation elements to users Webinars and Web conferences – online training or conference sessions that utilize Internet technology to provide interactive and presentation elements to users

Browsing Techniques Techniques available to make your browsing sessions more efficient: Using Bookmarks and FavoritesUsing Bookmarks and Favorites Using multiple windowsUsing multiple windows Following linksFollowing links

Configuring Browser Preferences Browser preferences you can configure to suit your working style include: Browser fontsBrowser fonts Home pageHome page History folderHistory folder Controlling pop-up and pop-under windowsControlling pop-up and pop-under windows Browser cache settingsBrowser cache settings Image loadingImage loading Cookie handlingCookie handling Cookie warningsCookie warnings

Configuring Browser Security You can configure your browser’s security settings to accept, reject or prompt before accepting: You can configure your browser’s security settings to accept, reject or prompt before accepting: ActiveX controlsActiveX controls Java appletsJava applets To restrict these items in Internet Explorer, set safety levels accordingly To restrict these items in Internet Explorer, set safety levels accordingly

Proxy Servers Proxy servers come between corporate networks and the Internet Proxy servers come between corporate networks and the Internet Proxy servers can provide the following services: Proxy servers can provide the following services: Web document cachingWeb document caching Corporate firewall accessCorporate firewall access Browsers must be properly configured to work with proxy servers Browsers must be properly configured to work with proxy servers Netscape Navigator can be manually configured to work with a proxy server, or can use a proxy server’s URL to automatically configure itself Netscape Navigator can be manually configured to work with a proxy server, or can use a proxy server’s URL to automatically configure itself Internet Explorer can automatically scan the network for a proxy server; it can also use a configuration script; or you can configure it manually Internet Explorer can automatically scan the network for a proxy server; it can also use a configuration script; or you can configure it manually

Troubleshooting Internet Client Problems By adjusting browser functions and settings, you can troubleshoot the following client problems: Poor renderingPoor rendering Slow connectionSlow connection No connectionNo connection Inability to render imagesInability to render images Slow browser and other system functionsSlow browser and other system functions