SlideShare a Scribd company logo
4/26/2010
sales@ebusinessmantra.com               1
   Web Browser is a software that is installed on your
    computer. It is used to locate and display web
    pages and other online content. Behind the scene,
    a browser performs lot of functions but its key role
    is to take your request to the web server and bring
    the content to you and display it.




                                                   4/26/2010
                    sales@ebusinessmantra.com                  2
   Finds the web server
   Takes your request and transports data
   Transports cookies
   Brings back content
   Processes the content and renders it
   Executes scripts (code)




                                               4/26/2010
                   sales@ebusinessmantra.com               3
   Enter a URL into a browser
    ◦ Breaks the URL into a host + path
       Asks a DNS server for an IP address for the host
       DNS server returns a IP address for that host
    ◦ Browser sends a request to the IP address
       Path is used to determine what file to obtain
       Data for web server to process, maintain state
       Server replies to the request – HTML, PDF, mp3, etc.
    ◦ Browser reads the HTML file and asks for all the files referenced in the
      original HTML file
       These additional files could be images, more HTML, or other types on content.
       Additional files could reside on different hosts requiring more DNS requests
       After browser gets all the pieces, it processes the data and renders a single
        “page”
       Non-HTML file are opened in the browser of associated application.




                                                                               4/26/2010
                            sales@ebusinessmantra.com                                      4
   Internet Explorer (Microsoft)
   Firefox
   Safari
   Chrome
   Opera
   Konqueror
   Several others




                                                4/26/2010
                    sales@ebusinessmantra.com               5
4/26/2010
sales@ebusinessmantra.com               6
   Data set by the web site owner
   Data you enter in the form
   Information you request
   Cookies
   Operating System, browser type
   Your IP address – can help determine your
    geographical location
   Referring page
   Much more


                                                4/26/2010
                  sales@ebusinessmantra.com                 7
   Example URLs:
    ◦ http://www.somesite.com
    ◦ https://www.somesite.com
    http – data is unencrypted while transport from the web
      browser to the web server
    https – data is encrypted while transported from the
      browser to the web server
    Make sure that data you don’t want anyone to eavesdrop is
      encrypted – https in the address bar; closed lock in the
      status bar



                                                         4/26/2010
                     sales@ebusinessmantra.com                       8
4/26/2010
sales@ebusinessmantra.com               9
   Use one browser for your “important” surfing and another for “casual”
    browsing. That way data from one can't leak to the other (generally
    speaking)
   Always keep an eye on the URL in the address bar
   Read, Pause before clicking on anything
   Logout and always close the browser window
   Nothing is “really” free. Only download
    files from websites you trust
   Don’t open attachments forwarded from your friend’s computer is
    corrupted
   Logout and close browser/tab
   The browser’s back and refresh features can be used to steal
    passwords from insecurely written applications.
   Be careful of Google search results
   Always type URL for sites where confidential information is in use.




                                                                     4/26/2010
                          sales@ebusinessmantra.com                              10
 Always use the red “X”
            in the corner of a pop-up
            screen

             Never click “yes,”
            “accept” or even “cancel”,
            because it could be a trick
            that installs software on
            your PC




                                          4/26/2010
sales@ebusinessmantra.com                             11
An Internet firewall
                   is like a moat
                   around a castle,
                   creating a barrier
                   between
                   your computer and
                   the Internet




                                    4/26/2010
sales@ebusinessmantra.com                       12
   Search results may contain malicious web site
   Does it make sense?




                                                    4/26/2010
                   sales@ebusinessmantra.com
   Keep passwords private and create ones that are
    hard to “crack”
   Use password checker (See resources)
    Never share your passwords with friends or be
    tricked into giving them away
   Do not email login name and password together
   Do not text message your login information
   If you do have to write, keep the paper in safe
    keeping


                                                4/26/2010
                   sales@ebusinessmantra.com                14
   Avoid creating passwords using
    ◦ Dictionary words in any language.
      Words in all languages are vulnerable
      Words spelled backwards, common misspellings, and
       abbreviations
    ◦ Sequences or repeated characters.
      Examples: 12345678, 222222, abcdefg, or adjacent letters
       on your keyboard (qwerty)
    ◦ Personal information.
      Your name, birthday, driver's license, passport number, or
       similar information



                                                              4/26/2010
                      sales@ebusinessmantra.com                           15
   Web browser
    ◦ http://en.wikipedia.org/wiki/Web_browser
   How browser works
    ◦ http://taligarsiel.com/Projects/howbrowserswork1.htm
   Securing your browser
    ◦ http://www.cert.org/tech_tips/securing_browser/
   Analysis: Browser Security
    ◦ http://www.networkcomputing.com/wireless/analysis-browser-
      security.php
   Microsoft Online Safety
    ◦ http://www.microsoft.com/protect
   Get Wise
    ◦ http://www.getnetwise.org
   Password Checker
    ◦ https://www.microsoft.com/protect/fraud/passwords/checker.aspx?WT.mc
      _id=Site_Link


                                                                    4/26/2010
                          sales@ebusinessmantra.com                             16

More Related Content

What's hot

Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Krutarth Vasavada
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
David Menken
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
SnapComms
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
Yasir Nafees
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
Raghav Chhabra
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
Jorge Sebastiao
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Ishan Girdhar
 
Security awareness
Security awarenessSecurity awareness
Security awareness
Josh Chandler
 

What's hot (20)

Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Phishing
PhishingPhishing
Phishing
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Ransomware
RansomwareRansomware
Ransomware
 

Viewers also liked

Java Regular Expression PART II
Java Regular Expression PART IIJava Regular Expression PART II
Java Regular Expression PART II
Abdul Rahman Sherzad
 
Password management for you
Password management for youPassword management for you
Password management for you
Chit Ko Ko Win
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016
Andrew Chen
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
Barry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
Helge Tennø
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
Barry Feldman
 

Viewers also liked (6)

Java Regular Expression PART II
Java Regular Expression PART IIJava Regular Expression PART II
Java Regular Expression PART II
 
Password management for you
Password management for youPassword management for you
Password management for you
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Similar to Safer browsing

Cyber security
Cyber securityCyber security
Cyber security
Anju Sharma
 
Hhs en10 web_security_and_privacy
Hhs en10 web_security_and_privacyHhs en10 web_security_and_privacy
Hhs en10 web_security_and_privacyShoaib Sheikh
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Defensive programing 101
Defensive programing 101Defensive programing 101
Defensive programing 101Niall Merrigan
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
Temok IT Services
 
The 5 most dangerous proxies
The 5 most dangerous proxiesThe 5 most dangerous proxies
The 5 most dangerous proxiesseldridgeD9
 
Browser security — ROOTS
Browser security — ROOTSBrowser security — ROOTS
Browser security — ROOTS
Andre N. Klingsheim
 
Online Privacy Basics - Library Program
Online Privacy Basics - Library ProgramOnline Privacy Basics - Library Program
Online Privacy Basics - Library Program
Rino Landa
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security Checklist
Pixel Crayons
 
configuring and using internet.pptx
configuring and using internet.pptxconfiguring and using internet.pptx
configuring and using internet.pptx
mtsedey2013
 
Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17
msz
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeJeremiah Grossman
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Is Drupal Secure?
Is Drupal Secure?Is Drupal Secure?
Is Drupal Secure?
David Timothy Strauss
 
Is Drupal secure?
Is Drupal secure?Is Drupal secure?
Is Drupal secure?
Four Kitchens
 
A%UIS.pptx
A%UIS.pptxA%UIS.pptx
A%UIS.pptx
dereje33
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
Margus Meigo
 

Similar to Safer browsing (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Hhs en10 web_security_and_privacy
Hhs en10 web_security_and_privacyHhs en10 web_security_and_privacy
Hhs en10 web_security_and_privacy
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Defensive programing 101
Defensive programing 101Defensive programing 101
Defensive programing 101
 
Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
The 5 most dangerous proxies
The 5 most dangerous proxiesThe 5 most dangerous proxies
The 5 most dangerous proxies
 
Browser security — ROOTS
Browser security — ROOTSBrowser security — ROOTS
Browser security — ROOTS
 
Online Privacy Basics - Library Program
Online Privacy Basics - Library ProgramOnline Privacy Basics - Library Program
Online Privacy Basics - Library Program
 
Unit6
Unit6Unit6
Unit6
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security Checklist
 
configuring and using internet.pptx
configuring and using internet.pptxconfiguring and using internet.pptx
configuring and using internet.pptx
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Is Drupal Secure?
Is Drupal Secure?Is Drupal Secure?
Is Drupal Secure?
 
Is Drupal secure?
Is Drupal secure?Is Drupal secure?
Is Drupal secure?
 
A%UIS.pptx
A%UIS.pptxA%UIS.pptx
A%UIS.pptx
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
 

Recently uploaded

Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 

Recently uploaded (20)

Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 

Safer browsing

  • 2. Web Browser is a software that is installed on your computer. It is used to locate and display web pages and other online content. Behind the scene, a browser performs lot of functions but its key role is to take your request to the web server and bring the content to you and display it. 4/26/2010 sales@ebusinessmantra.com 2
  • 3. Finds the web server  Takes your request and transports data  Transports cookies  Brings back content  Processes the content and renders it  Executes scripts (code) 4/26/2010 sales@ebusinessmantra.com 3
  • 4. Enter a URL into a browser ◦ Breaks the URL into a host + path  Asks a DNS server for an IP address for the host  DNS server returns a IP address for that host ◦ Browser sends a request to the IP address  Path is used to determine what file to obtain  Data for web server to process, maintain state  Server replies to the request – HTML, PDF, mp3, etc. ◦ Browser reads the HTML file and asks for all the files referenced in the original HTML file  These additional files could be images, more HTML, or other types on content.  Additional files could reside on different hosts requiring more DNS requests  After browser gets all the pieces, it processes the data and renders a single “page”  Non-HTML file are opened in the browser of associated application. 4/26/2010 sales@ebusinessmantra.com 4
  • 5. Internet Explorer (Microsoft)  Firefox  Safari  Chrome  Opera  Konqueror  Several others 4/26/2010 sales@ebusinessmantra.com 5
  • 7. Data set by the web site owner  Data you enter in the form  Information you request  Cookies  Operating System, browser type  Your IP address – can help determine your geographical location  Referring page  Much more 4/26/2010 sales@ebusinessmantra.com 7
  • 8. Example URLs: ◦ http://www.somesite.com ◦ https://www.somesite.com http – data is unencrypted while transport from the web browser to the web server https – data is encrypted while transported from the browser to the web server Make sure that data you don’t want anyone to eavesdrop is encrypted – https in the address bar; closed lock in the status bar 4/26/2010 sales@ebusinessmantra.com 8
  • 10. Use one browser for your “important” surfing and another for “casual” browsing. That way data from one can't leak to the other (generally speaking)  Always keep an eye on the URL in the address bar  Read, Pause before clicking on anything  Logout and always close the browser window  Nothing is “really” free. Only download files from websites you trust  Don’t open attachments forwarded from your friend’s computer is corrupted  Logout and close browser/tab  The browser’s back and refresh features can be used to steal passwords from insecurely written applications.  Be careful of Google search results  Always type URL for sites where confidential information is in use. 4/26/2010 sales@ebusinessmantra.com 10
  • 11.  Always use the red “X” in the corner of a pop-up screen  Never click “yes,” “accept” or even “cancel”, because it could be a trick that installs software on your PC 4/26/2010 sales@ebusinessmantra.com 11
  • 12. An Internet firewall is like a moat around a castle, creating a barrier between your computer and the Internet 4/26/2010 sales@ebusinessmantra.com 12
  • 13. Search results may contain malicious web site  Does it make sense? 4/26/2010 sales@ebusinessmantra.com
  • 14. Keep passwords private and create ones that are hard to “crack”  Use password checker (See resources)  Never share your passwords with friends or be tricked into giving them away  Do not email login name and password together  Do not text message your login information  If you do have to write, keep the paper in safe keeping 4/26/2010 sales@ebusinessmantra.com 14
  • 15. Avoid creating passwords using ◦ Dictionary words in any language.  Words in all languages are vulnerable  Words spelled backwards, common misspellings, and abbreviations ◦ Sequences or repeated characters.  Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty) ◦ Personal information.  Your name, birthday, driver's license, passport number, or similar information 4/26/2010 sales@ebusinessmantra.com 15
  • 16. Web browser ◦ http://en.wikipedia.org/wiki/Web_browser  How browser works ◦ http://taligarsiel.com/Projects/howbrowserswork1.htm  Securing your browser ◦ http://www.cert.org/tech_tips/securing_browser/  Analysis: Browser Security ◦ http://www.networkcomputing.com/wireless/analysis-browser- security.php  Microsoft Online Safety ◦ http://www.microsoft.com/protect  Get Wise ◦ http://www.getnetwise.org  Password Checker ◦ https://www.microsoft.com/protect/fraud/passwords/checker.aspx?WT.mc _id=Site_Link 4/26/2010 sales@ebusinessmantra.com 16