Upload
blusmurfydot1
View
328
Download
5
Embed Size (px)
DESCRIPTION
Citation preview
11
MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
Chapter 12
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 2
OVERVIEW
Configure Internet connections in Internet Explorer
Connect to resources using Internet Explorer
Configure and manage Internet Explorer security settings
Configure and manage Internet Explorer privacy settings
Audit and control add-on programs and browser helper objects with Add-On Manager
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 3
MANAGING INTERNET EXPLORER CONNECTIONS
Using the New Connection Wizard Dial-up
Broadband
Managing connection settings Local area network (LAN)
Proxy
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 4
NEW CONNECTION WIZARD (DIAL-UP)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 5
NEW CONNECTION WIZARD (BROADBAND)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 6
CONFIGURING LAN AND PROXY SERVER CONNECTIONS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 7
CONNECTING TO INTERNET RESOURCES
Uniform Resource Locators (URLs) Example: An Internet address (for example,
http://www.CT.gov/dmv), usually consisting of the access protocol (http), the domain name (www.CT.gov), and optionally the path to a file or resource residing on that server (dmv).
Web site resources
Using FTP resources
Connecting to Web folders
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 8
UNIFORM RESOURCE LOCATORS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 9
WEB SITE RESOURCES
HTML documents
Active content
Streaming media
Web-based applications
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 10
USING FTP
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 11
WEB FOLDERS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 12
INTERNET EXPLORER SECURITY
URL actions
Web content zones
Advanced security options
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 13
URL ACTIONS (SECURITY SETTINGS)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 14
WEB CONTENT ZONES (SECURITY ZONES)
Restricted
Internet
Local Intranet
Trusted Sites
Locked-Down Local Machine
Local Machine
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 15
CONFIGURING ZONE SECURITY
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 16
POLICY–BASED SECURITY MANAGEMENT
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 17
ADVANCED SECURITY SETTINGS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 18
MANAGING PRIVACY SETTINGS IN INTERNET EXPLORER
Cookies
Pop-Up Blocker
Internet caching
Browser history
AutoComplete
Password caching
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 19
…Notes…
Privacy is, in many ways, more important than security. Hacked systems that have damaged files or are overrun by viruses can be reformatted and reinstalled. The loss of trade secrets and personal data can do irreparable damage to a company’s (or an individual’s) reputation.
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 20
TYPES OF COOKIES
Definition - a packet of information sent by a server to a World Wide Web browser and then sent back by the browser each time it accesses that server.
Persistent - used to collect identifying information about the user
Session - stored in temporary memory and is not retained after the browser is closed. Session cookies do not collect information from the user’s computer.
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 21
TYPES OF COOKIES
First-party & Third-party
First-party cookies are cookies that are associated with the host domain.
Third-party cookies are cookies from any other domain.
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 22
MANAGING COOKIES
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 23
BLOCKING POP-UPS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 24
MANAGING TEMPORARY INTERNET FILES
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 25
MANAGING BROWSER HISTORY
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 26
CLEARING BROWSER CACHE AND HISTORY
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 27
AUTOCOMPLETE
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 28
INTERNET EXPLORER PASSWORD CACHE
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 29
CONTROLLING ADD-ON PROGRAMS
Add-on programs and ActiveX controls extend Internet Explorer.
Browser helper objects (BHOs) control browser operation.
You can manage add-ons and BHOs with Add-On Manager.
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 30
More Detail…
Browser add-on applications and BHOs are designed to extend and control the capabilities of Internet Explorer. They also can be designed to control Internet Explorer for malicious purposes. Many forms of Internet spyware are add-ons or BHOs.
Add-On Manager helps control the add-on and BHO applications on a system. If time permits, demonstrate using Add-On Manager. Describe how it is used to disable BHOs and other add-ons.
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 31
USING ADD-ON MANAGER
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 32
SUMMARY
Internet Explorer supports many Internet connection types.
Proxy and LAN settings might have to be set manually.
URLs help locate Internet content.
Internet Explorer uses Web content zones to define security.
Cookies are small files used to store preferences or personal data.
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 33
SUMMARY (CONTINUED)
The Temporary Internet Files folder caches Web pages to speed browsing.
Browser history and other data can be cleared to protect privacy.
You can use Add-On Manager to control add-ons and BHOs.