Dr. Samaher Hussein Ali Notes of Lecture 14

advertisement
Department of Software
The University of Babylon
LECTURE NOTES ON Browser Protection
By
Dr. Samaher Hussein Ali
College of Information Technology, University of Babylon, Iraq
Samaher@inet.uobabylon.edu.iq
21 December 2013
Def. of Browser
A web browser (commonly referred to as a browser) is a software application for
retrieving, presenting and traversing information resources on the World Wide
Web. An information resource is identified by a Uniform Resource Identifier
(URI/URL) and may be a web page, image, video or other piece of content.
Hyperlinks present in resources enable users easily to navigate their browsers to
related resources.
• Note 1:
The major web browsers are:
Google Chrome, Opera , Internet Explorer, Mozilla Firefox, and Safari.
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
Def. of Browser & Browser security
 Another Def. of Browser: A software program that allows a person to explore
the Internet in an easy to use way. Navigating the Internet through a series of
links the user is able to browse the Internet.
 Browser security is the application of Internet security to web browsers in
order to protect networked data and computer systems from breaches of
privacy or malware.
Q: How can we Protection of the browser from intruding without deleting the
history?
There are several ways in which we can make that your browser user security for our
personal information on whether there was more than one person using the same
computer through
 First: Hush adds protected bookmarks to Chrome’s incognito :mode
 Second: Private Browsing
 Third: Proxy Servers for Private Browsing
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
How can protect my Browser?
Protect browser from others who tracking the history is so important will be either by the following :
1.
using the private browser which don’t save any history of your browser sits , many browsers
supports this feature like chrome browser and Mozilla browser ,to active private Mozilla browser
will be by the following Steps:
Type “about;config” on Address bar
careful. I promise!” ,
2.
then warning window will appear then click on “I’ll be
then type “ Browser.private ”
make it True.
you can protect your Chrome Browser by create multi user window and each window have
username and password .
By the following:
•
Go to setting
21 December 2013
add new user
type the name and give password for each user.
Dr. Samaher Hussein Ali
Notes of Lecture 14
How to Secure Your Web Browser From Type Internet Explore
Microsoft Internet Explorer (IE) is a web browser integrated into the Microsoft Windows
operating
system.
Removal
of
this
application
is
not
practical.
In addition to supporting Java, scripting and other forms of active content, Internet
Explorer implements ActiveX technology. While any application is potentially vulnerable to
attack, it is possible to mitigate a number of serious vulnerabilities by using a web browser
that does not support ActiveX controls. However, using an alternate browser may affect
the functionality of some sites that require the use of ActiveX controls.
Note1:
that using a different web browser will not remove IE, or other Windows components
from the system. Other software, such as email clients, may use IE, the Web Browser
ActiveX control (Web OC), or the IE HTML rendering engine (MSHTML). Results from the
CERT/CC
ActiveX
workshop
in
2000
are
available
at
http://www.cert.org/reports/activeX_report.pdf. Here are steps to disable various
features in Internet Explorer 7. Note that menu options may vary between versions of IE,
so you should adapt the steps below as appropriate.
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
How to Secure Your Web Browser From Type Internet Explore
 In order to change settings for Internet Explorer, select Tools then Internet Options…
 Select the Security tab. On this tab you will find a section at the top that lists the various security zones
that Internet Explorer uses. More information about Internet Explorer security zones is available in the
Microsoft document Setting Up Security Zones. By selecting the High security setting, several features
including ActiveX, Active scripting, and Java will be disabled. With these features disabled, the browser
will be more secure. Click the Default Level button and then drag the slider control up to High.
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
How to Secure Your Web Browser From Type Internet Explore
For a more fine-grained control over what
features are allowed in the zone, click the
Custom Level button. Here you can control the
specific security options that apply to the
current zone. For example ActiveX can be
disabled by selecting Disable for Run ActiveX
controls and plug-ins. Default values for the
High security setting can be selected by
choosing High and clicking the Reset button to
apply the changes.
The Trusted sites zone is a security zone for sites
that you think are safe to visit. You believe that the
site is designed with security in mind and that it can
be trusted not to contain malicious content. To add
or remove sites from this zone, you can click the
Sites… button. This will open a secondary window
listing the sites that you trust and permitting you to
add or remove them. You may also require that only
verified sites (HTTPS) can be included in this zone.
This gives you greater assurance that the site you
are visiting is the site that it claims to be.
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
How to Secure Your Web Browser From Type Internet Explore
We recommend setting the security level for the Trusted
sites zone to Medium-high (or Medium for Internet
Explorer 6 and earlier). When the Internet Zone is set to
High, you may encounter web sites that do not function
properly due to one or more of the associated security
settings. This is where the Trusted sites zone can help. If
you trust that the site will not contain malicious content,
you can add it to the list of sites in the Trusted sites zone.
Once a site is added to this zone, features such as ActiveX
and Active scripting will be enabled for the site. The benefit
of this type of configuration is that IE will be more secure by
default, and sites can be “whitelisted” in the Trusted sites
zone to gain extra functionality.
The Privacy tab contains settings for cookies.
Cookies are text files placed on your computer by
various sites that you visit either directly (first-party)
or indirectly (third-party) through ad banners
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
How to Secure Your Web Browser From Type Internet Explore
You can then evaluate the originating site, whether
you wish to accept or deny the cookie, and what
action to take (allow or block, with the option to
remember the decision for all future cookies from
that web site). For example, if visiting a web site
causes a cookie prompt from a web domain that is
associated with advertising, you may wish to click
Block Cookie to prevent that domain from being
able to set cookies on your computer, for privacy
reasons
By selecting the Sites... button, you can manage the
cookie settings for specific sites. You can add or
remove sites, and you can change the current
settings for existing sites. The bottom section of this
window will specify the domain of the site and the
action to take when that site wants to place a cookie
on your machine. You can use the upper section of
this window to change these settings.
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
How to Secure Your Web Browser From Type Internet Explore
Alternatively, if you do not wish to receive warning
dialogs when a site attempts to set a cookie, you can
use Internet Explorer's pre-set privacy rules. Click
the Default button and then drag the slider up to
High. Note that some web sites may fail to function
properly with the High setting. In such cases, you
may add the site to the list of sites for which cookies
are allowed, as described above
The Advanced tab contains settings that apply to all
of the security zones. We recommend that you
disable the Enable third-party browser extensions
option. This option includes tool bars and Browser
Helper Objects (BHOs). While some add-ons can be
useful, they also have the ability to violate your
privacy. For example, a browser add-on may
monitor your web browsing habits, or even change
the contents of web pages in an attempt to gather
personal information.
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
How to Secure Your Web Browser From Type Internet Explore
Internationalized Domain Names (IDN) can be
abused to allow spoofing of web page addresses.
This can allow phishing attacks to be more
convincing. More details about IDN spoofing can
be found in Vulnerability Note VU#273262. To
protect against IDN spoofing in Internet Explorer,
enable the Always show encoded addresses
option. This will cause IDN addresses to be
displayed in an encoded form in the Internet
Explorer address bar and status bar, which will
remove the visual similarity to the spoofing target
address.
We also recommend that you disable the Play
sounds in webpages option. Sounds in web pages
are rarely integral to web page content, and may
also introduce security risks by having the browser
process additional untrusted data. This option is
for Internet Explorer's ability to natively handle
sounds. It will not interfere with other software,
such as Adobe Flash or Apple QuickTime.
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
How to Secure Your Web Browser From Type Internet Explore
Under the Programs tab, you can specify your
default applications for viewing web sites, email
messages and various other network related
tasks. You can also disable Internet Explorer from
asking you if you would like it to be your default
web browser here.
the links below show where to find
information for four popular web browsers:
 Opera - http://www.opera.com/support/tutorials/security
 Mozilla SeaMonkey http://www.mozilla.org/projects/seamonkey
 Konqueror - http://www.konqueror.org
 Netscape - http://browser.netscape.com
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
which information InPrivate Browsing discards when you close the browser
The following table describes which information InPrivate Browsing discards when you close the
browser and how it is affected during your browsing session
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
How do I open a new Private Window If I use the firefox?
There are two ways to open a new Private Window.
Open a new, blank Private Window
 At the top of the Firefox window, click the Firefox button and select New Private
Window. A new Private Window will open.
 Right-click on any link and choose Open Link in New Private Window from the context
menu. A new Private Window will open with the link you selected.
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
How do I open a new Private Window If I use the firefox?
 Important: When in Private Browsing mode, the Firefox button will be purple.
You may also have other windows open that are not Private Browsing
windows.
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
How do I open a new Private Window If I use the Firefox?
How do I always start Firefox in Private
Browsing?
There
is
a
setting
in
the Options window that automatically
enables Private Browsing whenever you
start Firefox.
Note: If you enter Private Browsing this
way, the Firefox button won't turn purple
but Firefox will still not retain your history
as described above.
1. At the top of the Firefox window, click
on the Firefox button and then select
Options
2. Select the Privacy panel.
3. Set Firefox will: to Never remember
history.
4. You will see a message that Firefox
needs to restart to enable this feature.
Click OK and Firefox will restart in
permanent Private Browsing mode.
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
Notes:
Note 1:
Private Browsing doesn't make you anonymous on the Internet. Your
Internet service provider, employer, or the sites themselves can still track what
pages you visit. Private Browsing also doesn't protect you from spyware that
may be installed on your computer
Note 2:
If you create new Bookmarks while using Private Browsing, they will not be
removed when you stop Private Browsing.
Note 3:
If you save files to your computer while using Private Browsing, they will
not be deleted when you stop Private Browsing. However, any files you open in
an external application will be cleared from the system's temporary folder, and
none of the files you download will appear in the Downloads list.
21 December 2013
Dr. Samaher Hussein Ali
Notes of Lecture 14
Download