20
Internet Internet Business Business Foundations Foundations © 2004 ProsoftTraining All rights reserved

Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Embed Size (px)

Citation preview

Page 1: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Internet BusinessInternet BusinessFoundationsFoundations

© 2004 ProsoftTrainingAll rights reserved

Page 2: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Lesson 2:Lesson 2:Web BrowsingWeb Browsing

Page 3: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

ObjectivesObjectives Identify the basic functions of Web browsersIdentify the basic functions of Web browsers Install a Web browserInstall a Web browser Identify the components of Web addressesIdentify the components of Web addresses Use browsers to authenticate and encryptUse browsers to authenticate and encrypt Identify considerations in selecting a browserIdentify considerations in selecting a browser Identify and locate resources for technical dataIdentify and locate resources for technical data Identify how businesses use browsersIdentify how businesses use browsers Use various browsing techniquesUse various browsing techniques Configure Web browser preferencesConfigure Web browser preferences Define and use cookiesDefine and use cookies Configure browser security settingsConfigure browser security settings Identify the function of proxy serversIdentify the function of proxy servers Troubleshoot common Internet client problemsTroubleshoot common Internet client problems

Page 4: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Basic Functions of Web Basic Functions of Web BrowsersBrowsers

Provide a way for users to access and navigate Provide a way for users to access and navigate Web pages Web pages

Display Web pages properlyDisplay Web pages properly Provide technology to enable multimedia featuresProvide technology to enable multimedia features Provide access to Internet services (such as FTP, Provide access to Internet services (such as FTP,

Telnet, news servers and e-mail)Telnet, news servers and e-mail) Perform authentication and encryption functionsPerform authentication and encryption functions

Page 5: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Installing a Web BrowserInstalling a Web Browser

Microsoft Internet Explorer 6.0 is packaged with Microsoft Internet Explorer 6.0 is packaged with Windows XP ProfessionalWindows XP Professional

Most browser software is available on the Web or Most browser software is available on the Web or through a vendor CDthrough a vendor CD

ISPs provide browser software on installation CD-ISPs provide browser software on installation CD-ROMsROMs

You should install the latest version of a browser You should install the latest version of a browser because it will have the most recent security because it will have the most recent security featuresfeatures

Look for and install browser updates as they Look for and install browser updates as they become availablebecome available

Page 6: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Web AddressesWeb Addresses

Every Web page has a unique address called a Every Web page has a unique address called a URLURL

URLs typically include the protocol, the Internet URLs typically include the protocol, the Internet resource (server or host name) and the domain resource (server or host name) and the domain namename

You enter absolute URLs into your browser’s You enter absolute URLs into your browser’s Address or Location boxAddress or Location box

Relative URLs can be used for coding Web sitesRelative URLs can be used for coding Web sites

Page 7: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

How Browsers WorkHow Browsers Work1.1. You enter a URL into the browserYou enter a URL into the browser2.2. Browser breaks the URL into three parts: Browser breaks the URL into three parts:

protocol, server and domain name, and file protocol, server and domain name, and file namename

3.3. Browser contacts a domain name server to Browser contacts a domain name server to translate server name into an IP addresstranslate server name into an IP address

4.4. Browser uses IP address to connect to Browser uses IP address to connect to serverserver

5.5. Browser uses HTTP to request a page from Browser uses HTTP to request a page from the serverthe server

6.6. Some level of authentication takes placeSome level of authentication takes place7.7. Server sends the requested page (coded in Server sends the requested page (coded in

HTML) to the browserHTML) to the browser8.8. Browser reads and interprets the HTML and Browser reads and interprets the HTML and

displays the Web pagedisplays the Web page

Page 8: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

AuthenticationAuthentication Authentication – the process of verifying the Authentication – the process of verifying the

identity of a user who logs on to a system, or identity of a user who logs on to a system, or the integrity of transmitted datathe integrity of transmitted data

General authentication types:General authentication types:• Anonymous logon – no user name or Anonymous logon – no user name or

password is required and authentication is password is required and authentication is handled transparently by the browser and handled transparently by the browser and serverserver

• Basic authentication – a user name and Basic authentication – a user name and password are required, and that information password are required, and that information is sent as plain textis sent as plain text

• Secure authentication – a user name and Secure authentication – a user name and password are required, and they are password are required, and they are encrypted before being sent across the encrypted before being sent across the InternetInternet

• Digital certificates – you must have the Digital certificates – you must have the proper digital certificate to gain access proper digital certificate to gain access

Page 9: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

EncryptionEncryption

Encryption – the process of converting data into Encryption – the process of converting data into an unreadable form of textan unreadable form of text

Decryption – the process of converting the Decryption – the process of converting the encrypted data back to its original formencrypted data back to its original form

Encryption and decryption are performed using Encryption and decryption are performed using keyskeys

Key – a mathematical algorithmKey – a mathematical algorithm The more complex the encryption algorithm, the The more complex the encryption algorithm, the

harder it is to decipher the encrypted message harder it is to decipher the encrypted message without access to the keywithout access to the key

Page 10: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Authentication protocolsAuthentication protocols Password Authentication Protocol (PAP) – used to Password Authentication Protocol (PAP) – used to

authenticate dial-up sessions for remote users authenticate dial-up sessions for remote users Challenge Handshake Authentication Protocol Challenge Handshake Authentication Protocol

(CHAP) – authenticates through a server sending (CHAP) – authenticates through a server sending a challenge phrase to a client and comparing the a challenge phrase to a client and comparing the client response (generated through a one-way client response (generated through a one-way hash function) with its own calculation of the hash function) with its own calculation of the expected hash valueexpected hash value

Microsoft Challenge Handshake Authentication Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) – a proprietary version of Protocol (MS-CHAP) – a proprietary version of CHAP used by servers running IIS CHAP used by servers running IIS

Page 11: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

SSL and TLSSSL and TLS

Secure Sockets Layer (SSL) – a protocol for secure Secure Sockets Layer (SSL) – a protocol for secure exchangesexchanges• authenticates using digital certificatesauthenticates using digital certificates• provides for data encryptionprovides for data encryption

Transport Layer Security (TLS) – successor to SSLTransport Layer Security (TLS) – successor to SSL• becoming more commonbecoming more common• based on SSL 3.0based on SSL 3.0• provides for encryption and authenticationprovides for encryption and authentication

Page 12: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Secure ProtocolsSecure Protocols

Various protocols in the TCP/IP suite can be made Various protocols in the TCP/IP suite can be made secure by running them over SSL/TLS, including:secure by running them over SSL/TLS, including:• HTTPSHTTPS• S/FTPS/FTP• IMAP/SIMAP/S• POP3SPOP3S

Page 13: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Browser ChoicesBrowser Choices

Most popular browsers in use today are Microsoft Most popular browsers in use today are Microsoft Internet Explorer and Netscape NavigatorInternet Explorer and Netscape Navigator

Alternative browsers include:Alternative browsers include:• MozillaMozilla• OperaOpera• KonquerorKonqueror• LynxLynx• ArachneArachne

Page 14: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Resources for Technical DataResources for Technical Data

The following Web sites are among the many you The following Web sites are among the many you can visit for technical data:can visit for technical data:• www.netcraft.comwww.netcraft.com• www.whatis.comwww.whatis.com• www.howstuffworks.comwww.howstuffworks.com• www.learnthenet.comwww.learnthenet.com• www.microsoft.com/technetwww.microsoft.com/technet

Page 15: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Business Uses of BrowsersBusiness Uses of Browsers

intranet – an internal or in-house Web site used intranet – an internal or in-house Web site used only by employees within a company only by employees within a company

extranet – an internal network designed to extranet – an internal network designed to provide access to selected external users; is not provide access to selected external users; is not available to the Internet public available to the Internet public

Webinars and Web conferences – online training Webinars and Web conferences – online training or conference sessions that utilize Internet or conference sessions that utilize Internet technology to provide interactive and technology to provide interactive and presentation elements to userspresentation elements to users

Page 16: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Browsing TechniquesBrowsing Techniques

Techniques available to make your browsing Techniques available to make your browsing sessions more efficient:sessions more efficient:• Using Bookmarks and FavoritesUsing Bookmarks and Favorites• Using multiple windowsUsing multiple windows• Following linksFollowing links

Page 17: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Configuring Browser Configuring Browser PreferencesPreferences

Browser preferences you can configure to suit Browser preferences you can configure to suit your working style include:your working style include:• Browser fontsBrowser fonts• Home pageHome page• History folderHistory folder• Controlling pop-up and pop-under windowsControlling pop-up and pop-under windows• Browser cache settingsBrowser cache settings• Image loadingImage loading• Cookie handlingCookie handling• Cookie warningsCookie warnings

Page 18: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Configuring Browser SecurityConfiguring Browser Security

You can configure your browser’s security You can configure your browser’s security settings to accept, reject or prompt before settings to accept, reject or prompt before accepting:accepting:• ActiveX controlsActiveX controls• Java appletsJava applets

To restrict these items in Internet Explorer, set To restrict these items in Internet Explorer, set safety levels accordinglysafety levels accordingly

Page 19: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Proxy ServersProxy Servers

Proxy servers come between corporate networks and Proxy servers come between corporate networks and the Internetthe Internet

Proxy servers can provide the following services:Proxy servers can provide the following services:• Web document cachingWeb document caching• Corporate firewall accessCorporate firewall access

Browsers must be properly configured to work with Browsers must be properly configured to work with proxy serversproxy servers

Netscape Navigator can be manually configured to Netscape Navigator can be manually configured to work with a proxy server, or can use a proxy server’s work with a proxy server, or can use a proxy server’s URL to automatically configure itselfURL to automatically configure itself

Internet Explorer can automatically scan the network Internet Explorer can automatically scan the network for a proxy server; it can also use a configuration for a proxy server; it can also use a configuration script; or you can configure it manuallyscript; or you can configure it manually

Page 20: Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Troubleshooting Internet Troubleshooting Internet Client ProblemsClient Problems

By adjusting browser functions and settings, you By adjusting browser functions and settings, you can troubleshoot the following client problems:can troubleshoot the following client problems:• Poor renderingPoor rendering• Slow connectionSlow connection• No connectionNo connection• Inability to render imagesInability to render images• Slow browser and other system functionsSlow browser and other system functions