1 Trustworthy Browsing Ian Moulster Software + Services Lead Microsoft Ltd.

Slides:



Advertisements
Similar presentations
The Internet and the Web
Advertisements

®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Browser Comparisons Internet Explorer 8 & 9, Chrome 11 and Firefox 4 Security, Privacy, Add-ons & Convenience.
Web 2.0 The Read/Write Web. History Tim Berners-Lee: World Wide Web 1989 Dream of sharing information back and forth Mosaic Web browser in 1993 Writing.
Jayesh Mowjee Security Consultant Microsoft Session Code: SIA 201.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
Privacy and Security on the Web Part 1. Agenda Questions? Stories? Questions? Stories? IRB: I will review and hopefully send tomorrow. IRB: I will review.
Virtual techdays INDIA │ 9-11 February 2011 Safe Browsing Experience for your Home & Office M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation.
Web-tracking and Adware Hannah Muihrienne Julie Chris.
“InPrivate” Jennifer Bui MIS 304 September 4, 2008 Professor Fang Jennifer Bui MIS 304 September 4, 2008 Professor Fang.
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
Internet Explorer 7 Security Features Steve Lamb Technical Security Microsoft Ltd
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
Norman SecureSurf Protect your users when surfing the Internet.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Security of Cookies In A Public Computer Lab Setting Russell Fech November 30, 2000.
Cyra Richardson Microsoft Corporation Internet Explorer 7.
Microsoft ® Official Course Module 9 Configuring Applications.
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
1 Brett Roberts Director of Innovation | Microsoft NZ | 28 Aug 07 Technology and Privacy.
P3P A New Standard in Online Privacy Overview and Demos from Summer 2000.
Securing Web Applications. IE 7 significantly reduced attack surface against the browser and local machine…
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Chapter 3 (HW02) Exploring the World Wide Web with Internet Explorer 9.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Cormac Keogh Microsoft Ireland Vikas Sahni Softedge Systems An Overview of IE8.
Know your enemy..... The Dancing Pig syndrome No amount of self-control can stop someone from clicking on links or running.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Matt Heller Internet Explorer Microsoft SIA315 Overview Security (15 min) Privacy (45 min) Q&A (15 min)
Module 5: Configuring Internet Explorer and Supporting Applications.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.
Cookies By: Kendra Alvarez. Concepts of Cookies Cookies are pieces of information generated by a Web server and stored in the user's computer, ready for.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 9 User Productivity Tools.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
1 Whats New in Internet Explorer 8? Ranjana Jain IT Pro Evangelist Microsoft India MCSE, MCT, RHCE, CIW Security Analyst, CISSP.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Matt Heller Aaron Margosis Microsoft Corporation CLI 314.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. WHAT IS SPAM? Spam in unsolicited message NTM Microsoft Apple.
Managing Windows Security
Personal spaces.
Unit 11 Using the Internet & Browsing the Web
Unit 12 Using the Internet & Browsing the Web
Internet and security.
Latest Updates on BlackHawk Mines Music : Privacy Policy
Cross-Site Request Forgeries: Exploitation and Prevention
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Unit 27 Web Server Scripting Extended Diploma in ICT
Internet Explorer 8 for Web Developers
Privacy and Data Mining
Chapter 9: Configuring Internet Explorer
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

1 Trustworthy Browsing Ian Moulster Software + Services Lead Microsoft Ltd

2 Web 2.0 provides significant benefits to the user and web publishers JavaScript, mashups and Active X provide functionality and versatility Extends the web Content syndication 2

3 Data Governance & Regulations Shifting attack vectors Cybercriminals continue to innovate and diversify Inadequate security and privacy reviews and processes Growth in ecommerce depends on consumer trust Trust is being tarnished by breaches and cybercrime Trust is undermined by less than transparent collection of data and inadequate privacy protection Unknown accountability between 1st party publishers of 3rd parties Potential backlash & heightened consumer concerns

4 The way web 2.0 works, and provides value to the user and web site Funds the “free” internet Over time, users’ history and profiles can unknowingly be aggregated Long-standing confusion about calls vs “ tracking cookies” Unclear accountability with third party security & privacy policies Increasing incidence of malvertising User Visits Unique Sites Contoso.comTailspin.comWoodgrovebank.com Example.com Farbrican.comSouthridge1-1.comLitware-bulk.comadventureworks.com Prosware-sol.com 3 rd party Syndicator Web server

5 Social Engineering & Exploits Reduce unwanted communications Social Engineering & Exploits Reduce unwanted communications Freedom from intrusion International Domain Name Anti-Spoofing Pop-up Blocker in IE6 Increased usability Choice and control Clear notice of information use Choice and control Clear notice of information use Control of information User-friendly, discoverable notices P3P-enabled cookie controls Delete Browsing History InPrivate™ Browsing & Blocking Browser & Web Server Exploits Deceptive websites, malicious code, fraud, identity theft Browser & Web Server Exploits Deceptive websites, malicious code, fraud, identity theft Protection from harm Secure Development Lifecycle Extended Validation (EV) SSL certs SmartScreen ® Filter Domain Highlighting XSS Filter, DEP/NX ActiveX Controls Lockdown

6 Scenarios Shopping for Gifts on a shared PC Business Investment Strategies Employment and Job Search Healthcare Advice …… 6

7 More Granular Control & Utility Can Preserve Favorite Data while deleting all other data retained by the browser

8 InPrivate InPrivate Browsing Enables “leave no tracks” locally (cookies, cache & history) Value when shopping for gifts on a shared PC. InPrivate Blocking Helps to put users in control of their info to third-party sites. Assess, on an ongoing basis, user exposure to third-party content. Helps to prevent information disclosure by automatically blocking high-frequency third-party content from sites users visit. 8

InPrivate is On InPrivate Browsing prevents Internet Explorer from storing data about your browsing session. This includes cookies, temporary Internet files, history, and other data. Learn more about InPrivate

16 Analyzes third parties who are in a position to aggregate user profiles Enhances choice and control on the sharing of data

17 Users can exercise choice Allow content being served and possible info disclosure Block content and help prevent info disclosure

18 Provides information by the third party to the consumer to help them make an informed allow or block choice

20 Provides users the ability to subscribe to third party block and allow lists (RSS Feeds)

24 Provides users the ability to subscribe to third party block and allow lists (RSS Feeds)

28 IE 8 through our broad set of security and privacy technologies helps to put the user in control over their personal information & privacy. IE 8 allows users to have notice and choice over information that is shared with third-party sites. IE 8 helps to preserve online trust & peace of mind. InPrivate provides vehicles for publishers and advertisers to communicate their value to consumers 28

29 IE 8 Feature Overview IE 8 blog IE 8 Readiness Toolkit explorer/beta/tech-resources.aspx explorer/beta/tech-resources.aspx IE 8 Safety & Privacy Features explorer/beta/features/browse-privately.aspx explorer/beta/features/browse-privately.aspx