9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET.

Slides:



Advertisements
Similar presentations
Threats and Protection Mechanisms
Advertisements

Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Tutorial 6: Internet Security.
1 Chapter 5 Security Threats to Electronic Commerce.
Security Threats to Electronic Commerce
Chapter 5 Security Threats to Electronic Commerce
Securing and Enhancing Your Use of the Internet
Sounds, Images & Other Objects Website Production.
Chapter 9: Privacy, Crime, and Security
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Implementing Electronic Commerce Security
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Implementing Security for Electronic Commerce
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Implementing Security for Electronic Commerce
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Computers Going Online Internet Browsers Browsers retrieve and view Internet-based information interact with servers download and upload information ©
Active X Microsoft’s Answer to Dynamic Content Reference: Using Active X by Brian Farrar QUE
HYPERTEXT MARKUP LANGUAGE (HTML)
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
XP New Perspectives on The Internet, Fifth Edition— Comprehensive, 2005 Update Tutorial 9 1 Securing and Enhancing Your Use of the Internet Internet Security.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 5: Multimedia on the Web.
CHAPTER 2 Communications, Networks, the Internet, and the World Wide Web.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
XP New Perspectives on the Internet, 4e Tutorial 9 1 Securing and Enhancing Your Use of the Internet Internet Security and Browser Extensions.
The Internet 8th Edition Tutorial 7 Security on the Internet and the Web.
Chapter 5 Security Threats to Electronic Commerce
The Internet 8th Edition Tutorial 9 Creating Effective Web Pages.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
1 Lecture 12: Multimedia Not in Web 101 Text  Important Multimedia Issues  Audio  Movies and Video  Multimedia and HTML Documents.
1 E-Commerce Security Part I – Threats. 2 Objectives Threats to –intellectual property rights –client computers –communication channels between computers.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
2.02G Publishing Animated Videos 2.02 Develop Computer Animations.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Chapter 7: E-Commerce Security and Payment system
1 World Wide Web Concepts (Chapter 18) 인공지능연구실. 2 목 차  Elements of the Web  Web Browsers  Keeping Tracking of your Favorite Web sites  Security and.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Multimedia Web Pages. Multimedia displays Browser can load web pages that contains multimedia elements 1. Helper applications: stand-alone programs that.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Lesson 5 MULTIMEDIA. Multimedia on the Web has expanded rapidly as broadband connections have allowed users to connect at faster speeds. Almost all Web.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Information Systems Design and Development Security Precautions Computing Science.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
Security Issues in Information Technology
Security on the Internet and the Web
Implementing Security for Electronic Commerce
12 E-Commerce Overview.
Security.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

9 2 Objectives Learn how to enhance your Web browser capabilities with browser extensions Discover where to locate popular browser extensions for Microsoft Internet Explorer Visit a Web site where you can test a plug-in

9 3 Objectives Investigate Internet security and learn about secrecy, integrity, necessity, and privacy Identify several ways to defend against security risks Learn about copyright and intellectual property rights on the Internet

9 4 Browser Extensions Allow a Web browser to perform tasks it was not originally designed to perform. Plug-ins – programs that a browser starts to display or play a specific file. Helper applications or helper apps – “help” a browser to display or play a file.

9 5 What Are Plug-Ins and Helper Applications? Plug-ins differ slightly from helper applications in the way they run. Helper applications are independent programs that are stored on your computer and are activated automatically when needed. Plug-ins do their work inside the browser and do not activate standalone programs.

9 6 What Are Plug-Ins and Helper Applications?

9 7

9 8 Figure 9-3

9 9 Browser Extension Categories Document and productivity Image viewer Multimedia Sound player Video player VRML and 3-D

9 10 Document and Productivity Browser Extensions Let you use a browser to read documents. Files saved in PDF format require Adobe Acrobat Reader. Microsoft Office lets the browser start Word, Excel and other Office files.

9 11 Image Viewer Browser Extensions Image viewer displays graphics. Display different picture file formats. More than one graphic viewer will be needed to view the different kinds of pictures on the Web. AutoDesk displays line drawings in the proprietary Drawing Web format. Real estate agents use iPix.

9 12 Multimedia Browser Extensions Largest category of browser extensions. Shockwave provides animated interfaces, interactive advertisements and product demonstrations, multi-user games, and streaming CD-quality audio. Flash displays high-impact user interfaces, interactive online advertising, and animation. Automatically installed with Internet Explorer and Navigator.

9 13 Multimedia Browser Extensions Figure 9-4

9 14 Sound Player Browser Extensions Let your Web browser play sounds. Beatnik and Crescendo deliver high-quality interactive music and sound on the Web. RealPlayer delivers MIDI music in very small file sizes. RealPlayer plays streaming audio and video and uses buffered play.

9 15 Video Player Browser Extensions Deliver movies to Web browsers. QuickTime technology plays video, sound, and music. QuickTime movie format is computer- platform neutral. QuickTime’s format was adopted by the ISO as the starting point for developing an improved and unified digital media storage format.

9 16 Video Player Browser Extensions

9 17 VRML and 3-D Browser Extensions Virtual Reality Modeling Language is a programming language that creates three- dimensional environments that can mimic known worlds or define fictional ones. Cosmo Player is a VRML player that lets you experience three-dimensional Web worlds without having special three-dimensional graphics acceleration hardware installed.

9 18 VRML and 3-D Browser Extensions

9 19 Finding Browser Extensions

9 20 Finding Browser Extensions

9 21 Finding Browser Extensions

9 22 Finding Browser Extensions

9 23 Installing and Testing Browser Extensions

9 24 Security Overview Protection of assets from unauthorized access, use, alteration, or destruction. Physical Security – tangible protection devices Logical Security – uses non-physical protections Countermeasure – procedure that recognizes, reduces, or eliminates a threat

9 25 Security Overview Figure 9-13

9 26 Security Overview Secrecy prevents unauthorized data disclosure and ensures the authenticity of the data’s source. Integrity prevents unauthorized data modification Necessity prevents data delays or denials.

9 27 Security Overview Copyright is the protection of expression.

9 28 Security Overview

9 29 Security Threats Integrity Threat – also know as active wiretapping Delay and Denial Threats – disrupts normal computer processing or deny processing entirely Intellectual Property Threats – use material without the owner’s permission

9 30 Security Threats Threat Delivery Mechanisms – –A hacker uses Trojan horses, viruses, and worms to attack computers. Computer Emergency Response Team has teams around the world to recognize and respond to computer attacks.

9 31 Security Threats

9 32 Security Countermeasures The security countermeasures necessary for Internet transactions should ensure that the transaction or message being sent: –Cannot be read by anyone except the intended recipient. –Is tamperproof, ensuring that no one was able to modify its contents or delete it entirely. –Is authored by the person who claims to be the sender.

9 33 Security Countermeasures A digital certificate contains: The certificate holder’s name, address, and address A special key that “unlocks” the digital certificate, thereby verifying the certificate’s authenticity The certificate's expiration date or validity period A trusted third party, called a certificate authority, which verifies the person’s identity and issues the digital certificate

9 34 Security Countermeasures Figure 9-17

9 35 Security Countermeasures

9 36 Secrecy and Privacy Encryption – process of coding information using a mathematical-based program and a secret key to produce a string of characters that is unreadable Decryption – the reverse of encryption Two-types of encryption used today: –Symmetric (private-key) encryption –Asymmetric (public-key) encryption

9 37 Secrecy and Privacy Figure 9-19

9 38 Secrecy and Privacy Figure 9-20

9 39 Protecting Web Commerce Transactions Sockets Layer (SSL) – widely used, nonproprietary protocol that travels as a separate layer on top of the TCP/IP protocol SSL uses both symmetric and asymmetric encryption and keys to ensure privacy. Session keys exist only during a single, active session between the browser and server.

9 40 Protecting Web Commerce Transactions Internet Explorer’s Secure State Indicator Navigator’s Secure State Indicator

9 41 Protecting Web Commerce Transactions

9 42 Protecting Web Commerce Transactions Figure 9-24

9 43 Integrity A message digest function program is used to maintain the integrity of an message. This program produces a number called a message authentication code or MAC. –It must be impossible or costly to reverse the MAC and produce the original message. –The MAC should be random to prevent creating the original message form the MAC. –The MAC must be unique to the message so there is an extremely small chance that two messages could ever produce the same MAC.

9 44 Integrity Figure 9-25

9 45 Necessity A necessity attack can slow down processing, completely remove an item, or deny its use. Programs that travel with applications to your browser can execute on your PC can be dangerous. May have the following components: –Java –JavaScript –ActiveX

9 46 Necessity

9 47 Security Countermeasures Whenever possible, avoid completing Web page registration forms. Omit your resume and other personal information from your Web page. Set your Web browser to limit or disable cookies. Purchase and use a virus detection program. Download software and files from known and trustworthy sources.