Guideline for Securing Your Web Browser P a G E | 2

Guideline for Securing Your Web Browser P a G E | 2

CMSGu2011-02 CERT-MU SECURITY GUIDELINE 2011 - 02 Mauritian Computer Emergency Response Team Enhancing Cyber Security in Mauritius Guideline For Securing Your Web Browser National Computer Board Mauritius JuJunene 2011 2011 Version 1.7 IssueIssue No. No. 4 2 National Computer Board © Table of Contents 1.0 Introduction .......................................................................................................................... 7 1.1 Purpose and Scope ........................................................................................................... 7 1.2 Audience........................................................................................................................... 7 1.3 Document Structure.......................................................................................................... 7 2.0 Background .......................................................................................................................... 8 3.0 Types of Web Browsers ....................................................................................................... 9 3.1 Microsoft Internet Explorer .............................................................................................. 9 3.2 Mozilla Firefox ................................................................................................................. 9 3.3 Safari ................................................................................................................................ 9 3.4 Chrome ........................................................................................................................... 10 3.5 Opera .............................................................................................................................. 10 3.6 Netscape Navigator ........................................................................................................ 10 4.0 Web Browser Features and Risks ...................................................................................... 11 4.1 ActiveX .......................................................................................................................... 11 4.2 Java ................................................................................................................................. 11 4.3 Plug-ins........................................................................................................................... 12 4.4 Cookies ........................................................................................................................... 12 4.5 JavaScript ....................................................................................................................... 12 4.6 VBScript ......................................................................................................................... 12 4.6.1 Cross-Site Scripting (XSS).......................................................................................... 13 4.6.2 Cross-Zone and Cross-Domain Vulnerabilities .......................................................... 13 4.6.3 Detection evasion ........................................................................................................ 13 5.0 How to Secure Your Web Browser ................................................................................... 14 5.1 Microsoft Internet Explorer ............................................................................................ 14 5.1.1 Security Zones ............................................................................................................. 15 5.1.2 Trusted Sites ................................................................................................................ 17 5.1.3 Managing Cookies....................................................................................................... 18 5.1.4 Advanced Privacy Settings.......................................................................................... 21 5.1.5 Setting Default Applications ....................................................................................... 22 5.2 Mozilla Firefox ............................................................................................................... 23 5.2.1 Browser History and Cookies ..................................................................................... 24 5.2.2 Add-on Options ........................................................................................................... 25 5.2.3 Download Settings ...................................................................................................... 27 5.2.4 Privacy Feature ............................................................................................................ 28 Guideline For Securing Your Web Browser P a g e | 2 National Computer Board © 5.2.5 NoScript Feature ......................................................................................................... 29 5.2.6 Plugins Feature ............................................................................................................ 30 5.3 Apple Safari.................................................................................................................... 31 5.3.1 Preferences Menu ........................................................................................................ 32 5.3.2 AutoFill Feature .......................................................................................................... 32 5.3.3 Security Options .......................................................................................................... 33 5.4 Google Chrome .............................................................................................................. 34 5.4.1 Privacy Settings ........................................................................................................... 35 5.4.2 Phishing and malware detection .................................................................................. 36 5.4.3 Images, JavaScript, and other Web Content Settings .................................................. 37 5.4.4 Managing Exceptions .................................................................................................. 38 5.5 Opera .............................................................................................................................. 38 5.5.1 The Address Field (1) .................................................................................................. 38 5.5.2. Opera's Security Badge (2) ......................................................................................... 39 5.5.3 Security Information ................................................................................................... 40 5.6 Netscape Navigator ........................................................................................................ 42 6.0 Conclusion ......................................................................................................................... 43 7.0 References ..................................................................................................................... 44 Appendix A .............................................................................................................................. 45 Security Terms Explained .................................................................................................... 45 Guideline For Securing Your Web Browser P a g e | 3 National Computer Board © Tables and Figures and Tables Tables Table 1 Phishing and Malware Alerts in Chrome .................................................................... 37 Table 2 Security Badges in Opera ........................................................................................... 39 Figures Figure 1 The “Tools” Tab in Internet Explorer 7 .................................................................... 15 Figure 2 The “Security” Tab in Internet Explorer 7 ................................................................ 16 Figure 3 The “Security” Settings in Internet Explorer 7.......................................................... 16 Figure 4 The “Trusted sites” zone in Internet Explorer 7 ........................................................ 17 Figure 5 Adding secure sites to the “Trusted sites” zone. ....................................................... 17 Figure 6 The “Privacy” Tab in Internet Explorer 7 ................................................................. 18 Figure 7 The “Advanced Privacy” Settings in Internet Explorer 7 ......................................... 19 Figure 8 The “Privacy” alert in Internet Explorer 7 ................................................................ 19 Figure 9 The “Per Site Privacy Actions” in Internet Explorer 7.............................................. 20 Figure 10 The “Internet” Options in Internet Explorer 7 ......................................................... 20 Figure 11 The “Enable third-party browser extensions” setting in Internet Explorer 7 .......... 21 Figure 12 “Encoded addresses” and “sounds” in Internet Explorer 7 ..................................... 22 Figure 13 The “Programs” Tab in Internet Explorer 7 ............................................................ 22 Figure 14 The “Tools” Tab in Mozilla Firefox ........................................................................ 23 Figure 15 The “Main” Tab in Mozilla Firefox .......................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    47 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us