9781435483712_PPT_ch07 - Cyber Safety Chapter 7: Secure...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Cyber Safety Chapter 7: Secure Internet Access Copyright by EC-Council All rights Objectives  Restrict site access  Identify a secure site  Describe Internet content filtering software  Enable Content Advisor Copyright by EC-Council All rights Objectives (contd.)  Use ratings to define and limit content access  Deal with cookies  Use P2P networks securely  Establish some security settings for a wireless network access point Copyright by EC-Council All rights Case Example  David recently bought his son a personal computer for his birthday  He knows Alex is a smart kid and is excited about opening a world of information to him  He is also concerned about his son being exposed to Web sites that show or use offensive language, nudity, or sexual or violent content  Alex shares a lot of music files over peer-to-peer networks like Kazaa  David would like to ensure that no hacker exploits this and uses the machine for unlawful purposes Copyright by EC-Council All rights Introduction  Browsers need to be configured to ensure security because browsers can be used as a means of attack  Attackers can also attempt a denial-of-service attack on the recipients computer through HTML code that freezes or crashes the browser (or the entire computer)  When Internet Explorer is installed, it considers all Web sites to be in a single zonethe Internet zone and stands guard with a medium level of security  Sites can be classified into three other categories: local intranet, trusted sites and restricted sites Copyright by EC-Council All Basic Browser Security Settings  To increase security while browsing on the Internet with Internet Explorer, you can:  Add a Web site to the list of trusted or restricted sites  Remove a Web site from a security zone  Change the security level of a zone Copyright by...
View Full Document

This note was uploaded on 06/08/2011 for the course COMPUTER CGS2100 taught by Professor Sanders during the Spring '09 term at Florida State College.

Page1 / 30

9781435483712_PPT_ch07 - Cyber Safety Chapter 7: Secure...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online