IT103Microsoft Windows XP/OS Chap12

Post on 13-Nov-2014

328 views 5 download

description

 

Transcript of IT103Microsoft Windows XP/OS Chap12

11

MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY

Chapter 12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 2

OVERVIEW

Configure Internet connections in Internet Explorer

Connect to resources using Internet Explorer

Configure and manage Internet Explorer security settings

Configure and manage Internet Explorer privacy settings

Audit and control add-on programs and browser helper objects with Add-On Manager

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 3

MANAGING INTERNET EXPLORER CONNECTIONS

Using the New Connection Wizard Dial-up

Broadband

Managing connection settings Local area network (LAN)

Proxy

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 4

NEW CONNECTION WIZARD (DIAL-UP)

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 5

NEW CONNECTION WIZARD (BROADBAND)

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 6

CONFIGURING LAN AND PROXY SERVER CONNECTIONS

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 7

CONNECTING TO INTERNET RESOURCES

Uniform Resource Locators (URLs) Example: An Internet address (for example,

http://www.CT.gov/dmv), usually consisting of the access protocol (http), the domain name (www.CT.gov), and optionally the path to a file or resource residing on that server (dmv).

Web site resources

Using FTP resources

Connecting to Web folders

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 8

UNIFORM RESOURCE LOCATORS

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 9

WEB SITE RESOURCES

HTML documents

Active content

Streaming media

Web-based applications

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 10

USING FTP

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 11

WEB FOLDERS

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 12

INTERNET EXPLORER SECURITY

URL actions

Web content zones

Advanced security options

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 13

URL ACTIONS (SECURITY SETTINGS)

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 14

WEB CONTENT ZONES (SECURITY ZONES)

Restricted

Internet

Local Intranet

Trusted Sites

Locked-Down Local Machine

Local Machine

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 15

CONFIGURING ZONE SECURITY

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 16

POLICY–BASED SECURITY MANAGEMENT

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 17

ADVANCED SECURITY SETTINGS

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 18

MANAGING PRIVACY SETTINGS IN INTERNET EXPLORER

Cookies

Pop-Up Blocker

Internet caching

Browser history

AutoComplete

Password caching

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 19

…Notes…

Privacy is, in many ways, more important than security. Hacked systems that have damaged files or are overrun by viruses can be reformatted and reinstalled. The loss of trade secrets and personal data can do irreparable damage to a company’s (or an individual’s) reputation.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 20

TYPES OF COOKIES

Definition - a packet of information sent by a server to a World Wide Web browser and then sent back by the browser each time it accesses that server.

Persistent - used to collect identifying information about the user

Session - stored in temporary memory and is not retained after the browser is closed. Session cookies do not collect information from the user’s computer.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 21

TYPES OF COOKIES

First-party & Third-party

First-party cookies are cookies that are associated with the host domain.

Third-party cookies are cookies from any other domain.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 22

MANAGING COOKIES

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 23

BLOCKING POP-UPS

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 24

MANAGING TEMPORARY INTERNET FILES

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 25

MANAGING BROWSER HISTORY

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 26

CLEARING BROWSER CACHE AND HISTORY

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 27

AUTOCOMPLETE

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 28

INTERNET EXPLORER PASSWORD CACHE

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 29

CONTROLLING ADD-ON PROGRAMS

Add-on programs and ActiveX controls extend Internet Explorer.

Browser helper objects (BHOs) control browser operation.

You can manage add-ons and BHOs with Add-On Manager.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 30

More Detail…

Browser add-on applications and BHOs are designed to extend and control the capabilities of Internet Explorer. They also can be designed to control Internet Explorer for malicious purposes. Many forms of Internet spyware are add-ons or BHOs.

Add-On Manager helps control the add-on and BHO applications on a system. If time permits, demonstrate using Add-On Manager. Describe how it is used to disable BHOs and other add-ons.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 31

USING ADD-ON MANAGER

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 32

SUMMARY

Internet Explorer supports many Internet connection types.

Proxy and LAN settings might have to be set manually.

URLs help locate Internet content.

Internet Explorer uses Web content zones to define security.

Cookies are small files used to store preferences or personal data.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 33

SUMMARY (CONTINUED)

The Temporary Internet Files folder caches Web pages to speed browsing.

Browser history and other data can be cleared to protect privacy.

You can use Add-On Manager to control add-ons and BHOs.