Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may. 2010 University of Palestine.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

® Microsoft Office 2010 Browser and Basics.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Google chrome operating system
Breaking Trust On The Internet
Lesson 4: Web Browsing.
Chapter 7: The Web and 1 The Web and Chapter 7.
James Tam Web Browsers In this section of notes you will learn about the web browsing process, some of the important features of popular browsers and a.
Computer Security and Penetration Testing
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
Chapter 9 Collecting Data with Forms. A form on a web page consists of form objects such as text boxes or radio buttons into which users type information.
Use my floppy disk. 1. copy short cut to desktop. 2.run NoAdHOSTS.exe 3. Surf without ad’s. 4.to reverse everything -edit out all url s you want to return.
Browser Comparisons - Convenience Internet Explorer 8 & 9, Chrome 11 and Firefox 4 Searching, Convenience & Add-ons.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Computer Concepts 2014 Chapter 7 The Web and .
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Security Awareness Chapter 3 Internet Security. Security Awareness, 3 rd Edition2 Objectives After completing this chapter, you should be able to do the.
Chapter 16 The World Wide Web Chapter Goals Compare and contrast the Internet and the World Wide Web Describe general Web processing Describe several.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
1 Session 1: Introduction to HTML Spring Today’s Agenda Cover useful terminology for today’s session HTML, browsers, servers, etc. HTML Tags Get.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
science/internet-intro
1 Figure 9-3: Webserver and E-Commerce Security Browser Attacks  Take over a client via the browser Interesting information on the client Can use browser.
Session 1: Introduction to HTML Fall Today’s Agenda Talk about the functions of the Internet Cover useful terminology for today’s session HTML,
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
The Internet What is the Internet? The Internet is a lot of computers over the whole world connected together so that they can share information. It.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Web Browsing Prepared by: Ms. Esraa AL Mousa. What is internet? The word “internet” is derived from the word inter- networking which means connecting.
Internet Safety.
Windows Tutorial 5 Protecting Your Computer
Tonga Institute of Higher Education IT 141: Information Systems
Chapter 10: Web Basics.
Section A: Web Technology
Technologies and Applications
Ways to protect yourself against hackers
Lesson 4: Web Browsing.
Warm Handshake with Websites, Servers and Web Servers:
Evolution of Internet.
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
Lesson 4: Web Browsing.
Chapter 9: Configuring Internet Explorer
Presentation transcript:

Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine College Name College of Information Technology Specialist Information Technology

Why Browsers Security is important Ignore a lot of users for updates. Independence between browser and operating system may be danger on users. Ignore a lot of users of warnings during browsing. Many Web sites require users to activate some features that might be danger. Some websites developers interested in browser features rather than confidentiality. Interdependence of web browsers with operating systems, increasing risk.

Types of risks that may face the browser Divided into tow types: 1- result of threats and function of browser. 2-result of using from users. Note \ some believe that the designers of browsers not bound by such risks that occur due to users, but this is wrong; because browsers are designed to fit all categories of users in different cultures and their use without any conditions or rules for use.

Uniform Resource Identifier (URL) URL can be used counterfeiting official sites (bank website). By adding letters or create words very close to the original site name (Address Obfuscation ). Then design the web page that is very similar to the original page, so the user cant notice the difference and enter his password. SO that’s depend on the user more than browser.

Cookies Cookies \ Information sent by web server to browser attached with requested resource. The browser save the cookies to sent it back during next requests. Cookies includes information about the User’s computer name,id, how many times you visit single site. The dangerous of Cookies is that it’s transmitting without any encryption. So it’s easy target to hackers. Note \ most of browsers support deleting of cookies files from the options menu.

Pop Up Windows The Pop Up Windows is less dangerous than others because most of browsers use pop up blockers that blocking those windows. The pop up windows may ask users for their passwords. And some sites may sent a virus or spaying tools through pop up windows. Simply when you open the site the pop up window opened automatically and you are just like clicking on direct link to download the virus or spam.

Java applet & ActiveX Java applet and ActiveX is active content require some applications to be installed on the users computer. ( Java applet is type of Java program that is created using Java programming language. It runs only within a browser and is downloaded from server and runs on the client's machine) (activeX is OOP tools that developed to facilitate running some application on your browser like Flash Player, Chatting and required by mail sites like Hotmail) Java applet is more secure than ActiveX because it’s limited to the environment that it’s work with. Java applet & ActiveX may include hacking codes,so we can ignore running of it if it’s not trusted or secure. Active contents can stopped by default way like Mozilla FireFox browser or manually by users.

Java Script Java Script / is a type of active content of browsers that used in web pages for providing specific functions. Java Script is simple to use and doesn’t need expert in programming. So it’s widely use by designers. The most important limitations of Java Script is that is the favorite language to hackers to access user’s computers or make them open pages without their known.

Hypertext Transfer Protocol Secure HTTPS HTTPS is an important protocol used in private and secret transactions through Internet. The problem of users with this protocol is that most of users don’t make sure running of this protocol during their transactions. Browsers view signs when the beginning of safe browsing, different from browser to another.

updates The silent updates is one of the modern ways to enhance the browser security (Google Chrome). Silent updates keep the browser up to date without any action from users to make sure they will be safe from attacks on threats. In a survey study on visitors of Google,shows that 45.2% of users didn’t use the new versions of the browsers,so they are in danger.

Browsers Add-Ons Browser Add-Ons is a basic methods in browsers,it’s provide great features. It’s similar to Active X but the difference here is the Add-Ons can’t running out the browser. The Add-Ons are not dangerous but some of it can include hacker programs to access the computers.

Finally, it’s hard to make sure that the browsers are safe and secure because of techniques that are using to hack browsers developing very fast and that’s make developing of browsers and increase security hard in every change in hacking techniques. So browsers security is sharing by browsers designer and Usres.

Guidelines for users Access to sites that important and sensitive transactions by writing their official sites not by using link by other site. Use Add-Ons that support control of (Java script ) and (Cookies). Not to download or install any software from any web site that is not official or trusted. Use two browsers one for daily use and another for important and sensitive use. Always Keep your browser and your system up to date.

ThAnk YoU