CMSGu2011-02 CERT-MU SECURITY GUIDELINE 2011 - 02 Mauritian Computer Emergency Response Team Enhancing Cyber Security in Mauritius Guideline For Securing Your Web Browser National Computer Board Mauritius JuJunene 2011 2011 Version 1.7 IssueIssue No. No. 4 2 National Computer Board © Table of Contents 1.0 Introduction .......................................................................................................................... 7 1.1 Purpose and Scope ........................................................................................................... 7 1.2 Audience........................................................................................................................... 7 1.3 Document Structure.......................................................................................................... 7 2.0 Background .......................................................................................................................... 8 3.0 Types of Web Browsers ....................................................................................................... 9 3.1 Microsoft Internet Explorer .............................................................................................. 9 3.2 Mozilla Firefox ................................................................................................................. 9 3.3 Safari ................................................................................................................................ 9 3.4 Chrome ........................................................................................................................... 10 3.5 Opera .............................................................................................................................. 10 3.6 Netscape Navigator ........................................................................................................ 10 4.0 Web Browser Features and Risks ...................................................................................... 11 4.1 ActiveX .......................................................................................................................... 11 4.2 Java ................................................................................................................................. 11 4.3 Plug-ins........................................................................................................................... 12 4.4 Cookies ........................................................................................................................... 12 4.5 JavaScript ....................................................................................................................... 12 4.6 VBScript ......................................................................................................................... 12 4.6.1 Cross-Site Scripting (XSS).......................................................................................... 13 4.6.2 Cross-Zone and Cross-Domain Vulnerabilities .......................................................... 13 4.6.3 Detection evasion ........................................................................................................ 13 5.0 How to Secure Your Web Browser ................................................................................... 14 5.1 Microsoft Internet Explorer ............................................................................................ 14 5.1.1 Security Zones ............................................................................................................. 15 5.1.2 Trusted Sites ................................................................................................................ 17 5.1.3 Managing Cookies....................................................................................................... 18 5.1.4 Advanced Privacy Settings.......................................................................................... 21 5.1.5 Setting Default Applications ....................................................................................... 22 5.2 Mozilla Firefox ............................................................................................................... 23 5.2.1 Browser History and Cookies ..................................................................................... 24 5.2.2 Add-on Options ........................................................................................................... 25 5.2.3 Download Settings ...................................................................................................... 27 5.2.4 Privacy Feature ............................................................................................................ 28 Guideline For Securing Your Web Browser P a g e | 2 National Computer Board © 5.2.5 NoScript Feature ......................................................................................................... 29 5.2.6 Plugins Feature ............................................................................................................ 30 5.3 Apple Safari.................................................................................................................... 31 5.3.1 Preferences Menu ........................................................................................................ 32 5.3.2 AutoFill Feature .......................................................................................................... 32 5.3.3 Security Options .......................................................................................................... 33 5.4 Google Chrome .............................................................................................................. 34 5.4.1 Privacy Settings ........................................................................................................... 35 5.4.2 Phishing and malware detection .................................................................................. 36 5.4.3 Images, JavaScript, and other Web Content Settings .................................................. 37 5.4.4 Managing Exceptions .................................................................................................. 38 5.5 Opera .............................................................................................................................. 38 5.5.1 The Address Field (1) .................................................................................................. 38 5.5.2. Opera's Security Badge (2) ......................................................................................... 39 5.5.3 Security Information ................................................................................................... 40 5.6 Netscape Navigator ........................................................................................................ 42 6.0 Conclusion ......................................................................................................................... 43 7.0 References ..................................................................................................................... 44 Appendix A .............................................................................................................................. 45 Security Terms Explained .................................................................................................... 45 Guideline For Securing Your Web Browser P a g e | 3 National Computer Board © Tables and Figures and Tables Tables Table 1 Phishing and Malware Alerts in Chrome .................................................................... 37 Table 2 Security Badges in Opera ........................................................................................... 39 Figures Figure 1 The “Tools” Tab in Internet Explorer 7 .................................................................... 15 Figure 2 The “Security” Tab in Internet Explorer 7 ................................................................ 16 Figure 3 The “Security” Settings in Internet Explorer 7.......................................................... 16 Figure 4 The “Trusted sites” zone in Internet Explorer 7 ........................................................ 17 Figure 5 Adding secure sites to the “Trusted sites” zone. ....................................................... 17 Figure 6 The “Privacy” Tab in Internet Explorer 7 ................................................................. 18 Figure 7 The “Advanced Privacy” Settings in Internet Explorer 7 ......................................... 19 Figure 8 The “Privacy” alert in Internet Explorer 7 ................................................................ 19 Figure 9 The “Per Site Privacy Actions” in Internet Explorer 7.............................................. 20 Figure 10 The “Internet” Options in Internet Explorer 7 ......................................................... 20 Figure 11 The “Enable third-party browser extensions” setting in Internet Explorer 7 .......... 21 Figure 12 “Encoded addresses” and “sounds” in Internet Explorer 7 ..................................... 22 Figure 13 The “Programs” Tab in Internet Explorer 7 ............................................................ 22 Figure 14 The “Tools” Tab in Mozilla Firefox ........................................................................ 23 Figure 15 The “Main” Tab in Mozilla Firefox .......................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages47 Page
-
File Size-