Web Browser Security Team iBrowse Sha-Myra Richardson John Darr.

Slides:



Advertisements
Similar presentations
3.02H Publishing a Website 3.02 Develop webpages..
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
What Are the Functions of ATM Machines?
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Eliminating Privacy Concerns for Online Access to Public Documents Nick Haralampopoulos April 16, 2003.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Prepared by: Nahed Al-Salah
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
Incident Response Updated 03/20/2015
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Social impacts of the use of it By: Mohamed Abdalla.
What is E-commerce Safety Precautions Password Strengths
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Cyber Crimes.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Staying Safe Online Keep your Information Secure.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
INDECISIVENESS By:. What to do? September 23, 2009Marsh 2  When given a problem to fix, many students are left to figure out what they want to do  People.
Types of Electronic Infection
Protecting Students on the School Computer Network Enfield High School.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
NetTech Solutions Protecting the Computer Lesson 10.
Julie Latham Digital Citizenship: An Informational Guide.
Staying Secure Online How do we buy and sell safely on the Internet?
Module: Software Engineering of Web Applications Chapter 3 (Cont.): user-input-validation testing of web applications 1.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Role Of Network IDS in Network Perimeter Defense.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
A Quick and Easy Crash Course Internet Safety for Everyone.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Millions of Dollars Lost. MAN IN THE BROWSER. TABLE OF CONTENTS Introduction Brief Examples of Man in the middle Defining MitB From Infection to Pay Day.
Managing Money Workshop The National Autistic Society AGM
Fix: Windows 10 Error Code 0x in Mail App u/6/b/ /alexwaston14/reimage-system-repair/ /pages/Reimage-Repair-Tool/
Computer Security Keeping you and your computer safe in the digital world.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Module: Software Engineering of Web Applications
Introduction to Web Safety
Cross-Site Request Forgeries: Exploitation and Prevention
Steps to Fix ESET NOD32 Antivirus Error 0008 Call
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Fix AOL Mail Blank Screen Error? If you get a blank screen while trying to sign in to AOL Mail then there may be some reason. do not worry! You just need.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
HOW DO I KEEP MY COMPUTER SAFE?
About us Gmail is a famous service which we use on a daily basis for sending s, getting promotional messages of certain products, receiving.
Cyber security and Computer Misuse
Internet Safety – Social Media
Chapter 9: Configuring Internet Explorer
Week 7 - Wednesday CS363.

Presentation transcript:

Web Browser Security Team iBrowse Sha-Myra Richardson John Darr

Why this is important: People who use the internet use web browsers. Transfer personal information Consumers make transactions through web browsers in which sensitive information is transferred. online shopping online bill-pay and other money transactions People who use the internet use web browsers. Transfer personal information Consumers make transactions through web browsers in which sensitive information is transferred. online shopping online bill-pay and other money transactions

Who can benefit: Everyone Almost everyone has used the internet for exchanging money in some fashion. With this research and hopefully web browsers becoming more secure, people will not have to worry whether their money is going to the right person or if someone is on the other end taking their identity. Everyone Almost everyone has used the internet for exchanging money in some fashion. With this research and hopefully web browsers becoming more secure, people will not have to worry whether their money is going to the right person or if someone is on the other end taking their identity.

Problems Browser Attacks Man In the Middle Spoofing JavaScript/ActiveX malicious code Browser Attacks Man In the Middle Spoofing JavaScript/ActiveX malicious code

Research Princeton University Conducted study on how people could access users browser histories and go through cookies (stored passwords, account information, etc.) Most browsers fail to catch such attacks sometimes even with the proper software installed. Princeton University Conducted study on how people could access users browser histories and go through cookies (stored passwords, account information, etc.) Most browsers fail to catch such attacks sometimes even with the proper software installed.

MIT Performed a study in which people would have to detect spoofing University of Pennsylvania Designed a “secure web browser,” which was actually successful in protecting against attacks. MIT Performed a study in which people would have to detect spoofing University of Pennsylvania Designed a “secure web browser,” which was actually successful in protecting against attacks.

Suggested Improvements The main thing that needs to be improved the most is the user themselves. In the study by MIT they noticed that: “Users fail to continuously check the browser’s security indicators, since maintaining security is not the user’s primary goal. Although users sometimes noticed suspicious signs coming from the indicators, they either did not know how to interpret the signs or they explained them away.” The main thing that needs to be improved the most is the user themselves. In the study by MIT they noticed that: “Users fail to continuously check the browser’s security indicators, since maintaining security is not the user’s primary goal. Although users sometimes noticed suspicious signs coming from the indicators, they either did not know how to interpret the signs or they explained them away.”

With this being said, there needs to be more education so that whenever a user enters a new webpage, they automatically think “is this page secure?”. If the user goes into each website with that mentality then they will be much safer and have a much less chance to be attacked.

Jennifer Kahng’s Study

Workload distribution Most of this project was spent working together in the Woodward 335 lab.

Conclusion Web browsers are becoming more and more secure. Also, there are more downloads available to detect certain attacks that you might face. Even though they are becoming more secure, it is up to the user to be sure that they are secure from attacks and other predators.

Future Work Since technology is ever-changing, there may be no end-all problem solution. The objective which researchers have on the security of web browsers is to continue to try to fix current problems as well as look out for those that are developing.