Virtual techdays INDIA │ 9-11 February 2011 Safe Browsing Experience for your Home & Office M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation.

Slides:



Advertisements
Similar presentations
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Advertisements

How to protect yourself, your computer, and others on the internet
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Primary Threats to Computer Security
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
Society The internet has shaped the way the world has advanced in society. Since the beginning of time, humans have developed.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
The Internet = A World of Opportunities
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group SEC303.
Norman SecureSurf Protect your users when surfing the Internet.
Microsoft ® Official Course Module 9 Configuring Applications.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
1 Brett Roberts Director of Innovation | Microsoft NZ | 28 Aug 07 Technology and Privacy.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Protecting Your Information Assets
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Chapter 3 (HW02) Exploring the World Wide Web with Internet Explorer 9.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
PLUG IT IN SIX Protecting Your Information Assets.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Module 5: Configuring Internet Explorer and Supporting Applications.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Computer Skills and Applications Computer Security.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
1 Trustworthy Browsing Ian Moulster Software + Services Lead Microsoft Ltd.
1 Whats New in Internet Explorer 8? Ranjana Jain IT Pro Evangelist Microsoft India MCSE, MCT, RHCE, CIW Security Analyst, CISSP.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : Network Security.
Managing Windows Security
Hotspot Shield Protect Your Online Identity
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Chapter 9: Configuring Internet Explorer
Presentation transcript:

virtual techdays INDIA │ 9-11 February 2011 Safe Browsing Experience for your Home & Office M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation

Agenda After attending this session you will be able to: – Understand online threat landscape – Get some tips on family safety & secure browsing at home – See some of the new security features of Internet Explorer in action 2

Primary Online Risks & Threats 3 Your computer Viruses Worms Trojans Spyware Your family Cyberbullies File sharing abuses Invasion of Privacy Disturbing Content Predators Yourself Online fraud Phishing Hoaxes Identity theft Spam

What can you do? 4 Your computer 1.Use an Internet firewall. 2.Keep your operating system up-to-date. 3.Install and maintain antivirus software. 4.Install and maintain antispyware software. Your family 1.Talk with your kids & set clear rules. 2.Keep personal information private. 3.Use individual accounts & passwords 4.Use family safety software & monitor usage. Yourself 1.Practice Internet behavior that lowers your risk. 2.Manage your personal information carefully. 3.Use anti-phishing and anti-spam technology.

Family Safety with Windows 7, Windows Live 5 Set up individual accounts Contact management Limit access to PC, Web sites, games View reports of kids’ computer use Limit access to Programs

Enhancing Online Trust & Confidence 6 Freedom from intrusion Choice and control Clear notice of information use Provide only what is needed Choice and control Clear notice of information use Provide only what is needed Control of information Browser & Web Server Exploits Protection from deceptive websites, malicious code, online fraud, identity theft Browser & Web Server Exploits Protection from deceptive websites, malicious code, online fraud, identity theft Protection from harm Social Engineering & Exploits Reduce unwanted communications Social Engineering & Exploits Reduce unwanted communications

Enhancing Online Trust & Confidence 7 Freedom from intrusion Choice and control Clear notice of information use Provide only what is needed Choice and control Clear notice of information use Provide only what is needed Control of information Browser & Web Server Exploits Protection from deceptive websites, malicious code, online fraud, identity theft Browser & Web Server Exploits Protection from deceptive websites, malicious code, online fraud, identity theft Protection from harm Social Engineering & Exploits Reduce unwanted communications Social Engineering & Exploits Reduce unwanted communications International Domain Name Anti-Spoofing Pop-up Blocker in Increased usability User-friendly, discoverable notices P3P-enabled cookie controls Delete Browsing History InPrivate™ Browsing & Blocking Secure Development Lifecycle Extended Validation (EV) SSL certs SmartScreen® Filter Domain Highlighting XSS Filter, DEP/NX ActiveX Controls Lockdown

Domain Highlighting Helps you to more accurately ascertain the domain of the site you are visiting. The domain is black, other characters are gray. 8

SmartScreen® Filter 9

XSS Filter XSS Attacks: – Steal cookies & history – Log keystrokes – Deface sites – Steal credentials (of a sort) – Port-scan the Intranet – Abuse browser/AX vulnerabilities – Evade phishing filters – Circumvent HTTPS 10

Delete Browsing History More Granular Control & Utility Can Preserve Favorite Data while deleting all other data retained by the browser 11

InPrivate InPrivate Browsing – Enables “leave no tracks” locally (cookies, cache & history) – Value when using public PCs & shopping for gifts on a shared PC. InPrivate Blocking – Helps to put users in control of their info to third-party sites. – Assess, on an ongoing basis, user exposure to third-party content. – Helps to prevent information disclosure by automatically blocking high-frequency third-party content from sites users visit. 12

New in IE 9 Improved Application Reputation – Uses reputation data to remove unnecessary warnings for well- known files, and show more severe warnings when the download is a higher risk of being malicious Improved SmartScreen Filter – Helps protect users from malware and phishing sites Malvertizing Protection – On some occasions a trustworthy site may inadvertently embed a malicious advertisement that can be used to attack you. IE9 helps protect you from risks such as these 13

Deployment challenges? The most IT friendly browser, with tools to manage and deploy – Nearly 1500 group policies – Ability to set preferences using IEAK – Integration with Windows to ensure ease of deployment 14

Some GP Examples for IE Security 15 Group PolicySetting Turn off Managing Phishing FilterAutomatic Turn off “Delete Browsing History functionality”Enable Security Zones: Do not allow users to change policiesEnable Security Zones: Do not allow users to add/delete sitesEnable \Internet Control Panel\Disable the Security pageEnable \Internet Control Panel\Prevent ignoring certificate errors Enable \Internet Control Panel\Security page\Turn on automatic detection of the intranet Enable \Internet Control Panel\Security page\ Turn on information bar notification for Intranet content Enable

Feeling Secure Already? Domain Highlighting SmartScreen Filter XSS Filter 16 Delete Browsing History InPrivate Browsing IE 9 Security

Secure, reliable, and private Leading malware protection Over 1 billion malware blocks Always improving efficiency 160 million phishing blocks SmartScreen download reputation

virtual techdays INDIA │ 9-11 February 2011 Have a safe browsing experience with: THANK YOU !