9 1 advanced web topics browser extensions and internet security new perspectives on the internet

47
1 9 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

Upload: erick-gary-short

Post on 08-Jan-2018

219 views

Category:

Documents


1 download

DESCRIPTION

9 3 Objectives Investigate Internet security and learn about secrecy, integrity, necessity, and privacy Identify several ways to defend against security risks Learn about copyright and intellectual property rights on the Internet

TRANSCRIPT

Page 1: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

1

9

ADVANCED WEB TOPICSBrowser Extensions and

Internet Security

New Perspectives onTHE INTERNET

Page 2: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

2

9

Objectives

• Learn how to enhance your Web browser capabilities with browser extensions

• Discover where to locate popular browser extensions for Microsoft Internet Explorer

• Visit a Web site where you can test a plug-in

Page 3: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

3

9

Objectives

• Investigate Internet security and learn about secrecy, integrity, necessity, and privacy

• Identify several ways to defend against security risks

• Learn about copyright and intellectual property rights on the Internet

Page 4: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

4

9

Browser Extensions

• Allow a Web browser to perform tasks it was not originally designed to perform.

• Plug-ins – programs that a browser starts to display or play a specific file.

• Helper applications or helper apps – “help” a browser to display or play a file.

Page 5: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

5

9What Are Plug-Ins

and Helper Applications?

• Plug-ins differ slightly from helper applications in the way they run.

• Helper applications are independent programs that are stored on your computer and are activated automatically when needed.

• Plug-ins do their work inside the browser and do not activate standalone programs.

Page 6: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

6

9What Are Plug-Ins

and Helper Applications?

Page 7: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

7

9What Are Plug-Ins

and Helper Applications?

Page 8: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

8

9What Are Plug-Insand Helper Applications?

Figure 9-3

Page 9: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

9

9

Browser Extension Categories

• Document and productivity• Image viewer• Multimedia• Sound player• Video player• VRML and 3-D

Page 10: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

10

9Document and

Productivity Browser Extensions

• Let you use a browser to read documents.

• Files saved in PDF format require Adobe Acrobat Reader.

• Microsoft Office lets the browser start Word, Excel and other Office files.

Page 11: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

11

9

Image Viewer Browser Extensions

• Image viewer displays graphics.

• Display different picture file formats. More than one graphic viewer will be needed to view the different kinds of pictures on the Web.

• AutoDesk displays line drawings in the proprietary Drawing Web format.

• Real estate agents use iPix.

Page 12: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

12

9

Multimedia Browser Extensions

• Largest category of browser extensions.

• Shockwave provides animated interfaces, interactive advertisements and product demonstrations, multi-user games, and streaming CD-quality audio.

• Flash displays high-impact user interfaces, interactive online advertising, and animation. Automatically installed with Internet Explorer and Navigator.

Page 13: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

13

9

Multimedia Browser Extensions

Figure 9-4

Page 14: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

14

9

Sound Player Browser Extensions

• Let your Web browser play sounds.

• Beatnik and Crescendo deliver high-quality interactive music and sound on the Web.

• RealPlayer delivers MIDI music in very small file sizes. RealPlayer plays streaming audio and video and uses buffered play.

Page 15: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

15

9

Video Player Browser Extensions

• Deliver movies to Web browsers.

• QuickTime technology plays video, sound, and music. QuickTime movie format is computer-platform neutral.

• QuickTime’s format was adopted by the ISO as the starting point for developing an improved and unified digital media storage format.

Page 16: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

16

9

Video Player Browser Extensions

Page 17: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

17

9

VRML and 3-D Browser Extensions

• Virtual Reality Modeling Language is a programming language that creates three-dimensional environments that can mimic known worlds or define fictional ones.

• Cosmo Player is a VRML player that lets you experience three-dimensional Web worlds without having special three-dimensional graphics acceleration hardware installed.

Page 18: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

18

9

VRML and 3-D Browser Extensions

Page 19: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

19

9

Finding Browser Extensions

Page 20: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

20

9

Finding Browser Extensions

Page 21: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

21

9

Finding Browser Extensions

Page 22: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

22

9

Finding Browser Extensions

Page 23: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

23

9Installing and Testing Browser Extensions

Page 24: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

24

9

Security Overview

• Protection of assets from unauthorized access, use, alteration, or destruction.

• Physical Security – tangible protection devices

• Logical Security – uses non-physical protections

• Countermeasure – procedure that recognizes, reduces, or eliminates a threat

Page 25: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

25

9

Security Overview

Figure 9-13

Page 26: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

26

9

Security Overview

• Secrecy prevents unauthorized data disclosure and ensures the authenticity of the data’s source.

• Integrity prevents unauthorized data modification

• Necessity prevents data delays or denials.

Page 27: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

27

9

Security Overview• Copyright is the protection of expression.

Page 28: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

28

9Security Overview

Page 29: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

29

9

Security Threats

• Integrity Threat – also know as active wiretapping

• Delay and Denial Threats – disrupts normal computer processing or deny processing entirely

• Intellectual Property Threats – use material without the owner’s permission

Page 30: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

30

9

Security Threats

• Threat Delivery Mechanisms –

– A hacker uses Trojan horses, viruses, and worms to attack computers.

• Computer Emergency Response Team has teams around the world to recognize and respond to computer attacks.

Page 31: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

31

9Security Threats

Page 32: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

32

9

Security Countermeasures The security countermeasures necessary for

Internet transactions should ensure that the transaction or message being sent:

– Cannot be read by anyone except the intended recipient.

– Is tamperproof, ensuring that no one was able to modify its contents or delete it entirely.

– Is authored by the person who claims to be the sender.

Page 33: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

33

9

Security Countermeasures

A digital certificate contains:

• The certificate holder’s name, address, and e-mail address

• A special key that “unlocks” the digital certificate, thereby verifying the certificate’s authenticity

• The certificate's expiration date or validity period• A trusted third party, called a certificate authority,

which verifies the person’s identity and issues the digital certificate

Page 34: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

34

9Security Countermeasures

Figure 9-17

Page 35: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

35

9

Security Countermeasures

Page 36: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

36

9

Secrecy and Privacy

• Encryption – process of coding information using a mathematical-based program and a secret key to produce a string of characters that is unreadable

• Decryption – the reverse of encryption

• Two-types of encryption used today:– Symmetric (private-key) encryption– Asymmetric (public-key) encryption

Page 37: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

37

9

Secrecy and Privacy

Figure 9-19

Page 38: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

38

9

Secrecy and Privacy

Figure 9-20

Page 39: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

39

9

Protecting Web Commerce Transactions

• Sockets Layer (SSL) – widely used, nonproprietary protocol that travels as a separate layer on top of the TCP/IP protocol

• SSL uses both symmetric and asymmetric encryption and keys to ensure privacy.

• Session keys exist only during a single, active session between the browser and server.

Page 40: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

40

9

Protecting Web Commerce Transactions

Internet Explorer’s Secure State Indicator

Navigator’s Secure State Indicator

Page 41: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

41

9

Protecting Web Commerce Transactions

Page 42: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

42

9

Protecting Web Commerce Transactions

Figure 9-24

Page 43: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

43

9

Integrity• A message digest function program is used to

maintain the integrity of an e-mail message.

• This program produces a number called a message authentication code or MAC.

– It must be impossible or costly to reverse the MAC and produce the original message.

– The MAC should be random to prevent creating the original message form the MAC.

– The MAC must be unique to the message so there is an extremely small chance that two messages could ever produce the same MAC.

Page 44: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

44

9

Integrity

Figure 9-25

Page 45: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

45

9

Necessity

• A necessity attack can slow down processing, completely remove an item, or deny its use.

• Programs that travel with applications to your browser can execute on your PC can be dangerous. May have the following components:– Java– JavaScript– ActiveX

Page 46: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

46

9

Necessity

Page 47: 9 1 ADVANCED WEB TOPICS Browser Extensions and Internet Security New Perspectives on THE INTERNET

47

9

Security Countermeasures• Whenever possible, avoid completing Web page

registration forms.

• Omit your resume and other personal information from your Web page.

• Set your Web browser to limit or disable cookies.

• Purchase and use a virus detection program.

• Download software and files from known and trustworthy sources.