SlideShare une entreprise Scribd logo
1  sur  16
Seminar On
Browser Security
Submitted to:
Dr. S.R.Sirsat Sir
(Head of department)
(Department of Computer Science)
Prof .A.V. Borde Mam
(Asst. Prof)
(Department Of Computer Science)
Submitted By :
Pratimesh Umesh Pathak
Bsc IIIrd Year
Jijamata Mahavidyalaya Buldana
Preface
I have made this presentation file on the topic COMPUTER
Browser Security . I have tried my best to present all the details
information about security in browser .In the beginning I have tried to
give you general information on this topic.
I express my sincere gratitude to Dr.S.R.Sirsat sir
Prof. A.V. Borde Mam who assisting me throughout the preparation of
this topic. I thank him for providing me the confidence performing act
and most importantly the track of the topic whenever I needed it.
Content:
• Introduction.
• Browser security topics.
• Plug-in and extensions.
• Preserving web privacy.
• Crowds.
• Security Risks.
• Port access restrictions.
• Verifier.
• Type Safety.
• Security Manager.
• Summary: Browser security.
Introduction :
Browser security is the application of Internet security to
web browsers in order to protect network data and computer systems
from breaking of privacy or malware.
The web browser is the primary vector by which malware is
introduced to computers. The web browser is the primary vector by
which malware is introduced to computers. Links in phishing emails,
compromised web sites, and Trojan zed “free” software downloads
all deliver malware via web browser downloads
Browser security topics:
 Cookies:
• Cookie mechanism, Junk Buster, P3P
 Privacy:
• Anonymizer
 Plug-in:
• JavaScript
• ActiveX
• Java
Plug-in and extensions.
Browser plug-in and extensions extend the attack surface, exposing
vulnerabilities in Adobe Flash Player, Adobe (Acrobat) Reader, Java plug-in,
and ActiveX that are commonly exploited.
Malware may also be implemented as a browser extension, such as
a browser helper object in the case of Internet Explorer. Browsers like Google
Chrome and Mozilla Firefox can block—or warn users of—insecure plug-in.
Preserving web privacy
 Your IP address may be visible to web sites.
 This may reveal your employer, ISP, etc.
 Can link activities on different sites, different times.
 Some mechanisms exist to keep sites from learning information about you.
 Anonymizer
o Single site that hides origin of web request
 Crowds
o Crowds is a proposed anonymity network for anonymous web
browsing.
Crowds.
 Sender randomly chooses a path through the crowd
 Some routers are honest, some corrupt
 After receiving a message, honest router flips a coin
• With probability Pf routes to the next member on the path
• With probability 1- Pf sends directly to the recipient
C
C
C
C0
sender
C1
C
C
C
C
C2
1-pf
pf
C3 C4
recipient
C
Security Risks :
 Annoyance or inconvenience
o Display large window that ignores mouse input
o Play irritating sound and do not stop
o Consume CPU cycles, memory, network bandwidth …
 Export confidential information
o Communication is generally possible
o Prevent access to password file, credit card number, …
o Subtle attack: trick dialog boxes ...
 Modify or compromise system
o Delete files, call system functions
Port access restrictions :
URL structure technically permits an arbitrary, non-standard TCP port to
be specified for any request. Unfortunately, this permitted attackers to trick
browsers into meaningfully interacting with network services that do not really
understand HTTP . Because of this, a rather arbitrary subset of ports belonging to
common network services is in modern days blocked.
Browser Blocked Ports
Firefox, Safari, Opera, Chrome,
Android
(tcpmux), (echo), (discard),
(systat), (uucp), etc.
Explorer , maxthon. (chargen), (ftp), (smtp), (pop3),
(nntp), (imap2), (imap3), (ssl
imap3)
Verifier :
 Byte code may not come from standard compiler.
Harmful hacker may write dangerous byte code .
 Verifier checks correctness of byte code.
o Every instruction must have a valid operation code.
o Every branch instruction must branch to the start of some
other instruction, not middle of instruction .
o Every method must have a structurally correct signature.
Type Safety:
 Load-time type checking.
 Run-time type checking.
o All casts are checked to make sure type safe.
o All array references are checked to be within bounds.
o References are tested to be not null before dereference.
 Additional features.
o Automatic garbage collection.
o NO pointer arithmetic.
Security Manager :
 Java library functions call security manager.
 Security manager object answers at run time.
 Decide if calling code is allowed to do operation.
 Examine protection domain of calling class.
• Signer: organization that signed code before loading.
• Location: URL where the Java classes came from.
Uses the system policy to decide access permission
Summary: Browser security :
 Browser uses network and local disk.
o Potential for outside access to local data.
 Brower interprets code from network
o HTML, JavaScript, ActiveX, Java.
 Browser installs, executes plug-ins.
o Acrobat, Shockwave .
 Malicious code can pose risks.
o Consume resources, Steal information, Compromise system
Browser Security Seminar Submission
Browser Security Seminar Submission

Contenu connexe

Tendances

Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITYSupanShah2
 
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking   Chapter 7 - Enumeration - Eric VanderburgEthical hacking   Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking Chapter 7 - Enumeration - Eric VanderburgEric Vanderburg
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationChris Gates
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingAnurag Srivastava
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi The TNS Group
 
Honey po tppt
Honey po tpptHoney po tppt
Honey po tpptArya AR
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printingleminhvuong
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic conceptsKhoa Nguyen
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar reportInder NeGi
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 

Tendances (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITY
 
Honeypot
Honeypot Honeypot
Honeypot
 
Xss
XssXss
Xss
 
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking   Chapter 7 - Enumeration - Eric VanderburgEthical hacking   Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
 
Honey po tppt
Honey po tpptHoney po tppt
Honey po tppt
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
Malware
MalwareMalware
Malware
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 

Similaire à Browser Security Seminar Submission

Operating systems and computer security
Operating systems and computer securityOperating systems and computer security
Operating systems and computer securitySwati Bhonde
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanningleminhvuong
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008ClubHack
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008ClubHack
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far AlleneMcclendon878
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdingershawn_merdinger
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsnooralmousa
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Needamiable_indian
 

Similaire à Browser Security Seminar Submission (20)

Net Defender
Net DefenderNet Defender
Net Defender
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
Operating systems and computer security
Operating systems and computer securityOperating systems and computer security
Operating systems and computer security
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Super1
Super1Super1
Super1
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Sembang2 Keselamatan It 2004
Sembang2 Keselamatan It 2004Sembang2 Keselamatan It 2004
Sembang2 Keselamatan It 2004
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
 
Cisel1 d
Cisel1 dCisel1 d
Cisel1 d
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
 

Plus de Pratimesh Pathak

Nuclear fission and fusion By Pratimesh pathak
Nuclear fission and fusion By Pratimesh pathakNuclear fission and fusion By Pratimesh pathak
Nuclear fission and fusion By Pratimesh pathakPratimesh Pathak
 
Fiber optic communication By Pratimesh pathak
 Fiber optic communication By Pratimesh pathak  Fiber optic communication By Pratimesh pathak
Fiber optic communication By Pratimesh pathak Pratimesh Pathak
 
Structure of earth by pratimesh pathak
Structure of earth by pratimesh pathakStructure of earth by pratimesh pathak
Structure of earth by pratimesh pathakPratimesh Pathak
 
Energy band and energy gap by Pratimesh pathak
Energy band and energy gap by Pratimesh pathakEnergy band and energy gap by Pratimesh pathak
Energy band and energy gap by Pratimesh pathakPratimesh Pathak
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Pratimesh Pathak
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 

Plus de Pratimesh Pathak (6)

Nuclear fission and fusion By Pratimesh pathak
Nuclear fission and fusion By Pratimesh pathakNuclear fission and fusion By Pratimesh pathak
Nuclear fission and fusion By Pratimesh pathak
 
Fiber optic communication By Pratimesh pathak
 Fiber optic communication By Pratimesh pathak  Fiber optic communication By Pratimesh pathak
Fiber optic communication By Pratimesh pathak
 
Structure of earth by pratimesh pathak
Structure of earth by pratimesh pathakStructure of earth by pratimesh pathak
Structure of earth by pratimesh pathak
 
Energy band and energy gap by Pratimesh pathak
Energy band and energy gap by Pratimesh pathakEnergy band and energy gap by Pratimesh pathak
Energy band and energy gap by Pratimesh pathak
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 

Dernier

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Dernier (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Browser Security Seminar Submission

  • 1. Seminar On Browser Security Submitted to: Dr. S.R.Sirsat Sir (Head of department) (Department of Computer Science) Prof .A.V. Borde Mam (Asst. Prof) (Department Of Computer Science) Submitted By : Pratimesh Umesh Pathak Bsc IIIrd Year Jijamata Mahavidyalaya Buldana
  • 2. Preface I have made this presentation file on the topic COMPUTER Browser Security . I have tried my best to present all the details information about security in browser .In the beginning I have tried to give you general information on this topic. I express my sincere gratitude to Dr.S.R.Sirsat sir Prof. A.V. Borde Mam who assisting me throughout the preparation of this topic. I thank him for providing me the confidence performing act and most importantly the track of the topic whenever I needed it.
  • 3. Content: • Introduction. • Browser security topics. • Plug-in and extensions. • Preserving web privacy. • Crowds. • Security Risks. • Port access restrictions. • Verifier. • Type Safety. • Security Manager. • Summary: Browser security.
  • 4. Introduction : Browser security is the application of Internet security to web browsers in order to protect network data and computer systems from breaking of privacy or malware. The web browser is the primary vector by which malware is introduced to computers. The web browser is the primary vector by which malware is introduced to computers. Links in phishing emails, compromised web sites, and Trojan zed “free” software downloads all deliver malware via web browser downloads
  • 5. Browser security topics:  Cookies: • Cookie mechanism, Junk Buster, P3P  Privacy: • Anonymizer  Plug-in: • JavaScript • ActiveX • Java
  • 6. Plug-in and extensions. Browser plug-in and extensions extend the attack surface, exposing vulnerabilities in Adobe Flash Player, Adobe (Acrobat) Reader, Java plug-in, and ActiveX that are commonly exploited. Malware may also be implemented as a browser extension, such as a browser helper object in the case of Internet Explorer. Browsers like Google Chrome and Mozilla Firefox can block—or warn users of—insecure plug-in.
  • 7. Preserving web privacy  Your IP address may be visible to web sites.  This may reveal your employer, ISP, etc.  Can link activities on different sites, different times.  Some mechanisms exist to keep sites from learning information about you.  Anonymizer o Single site that hides origin of web request  Crowds o Crowds is a proposed anonymity network for anonymous web browsing.
  • 8. Crowds.  Sender randomly chooses a path through the crowd  Some routers are honest, some corrupt  After receiving a message, honest router flips a coin • With probability Pf routes to the next member on the path • With probability 1- Pf sends directly to the recipient C C C C0 sender C1 C C C C C2 1-pf pf C3 C4 recipient C
  • 9. Security Risks :  Annoyance or inconvenience o Display large window that ignores mouse input o Play irritating sound and do not stop o Consume CPU cycles, memory, network bandwidth …  Export confidential information o Communication is generally possible o Prevent access to password file, credit card number, … o Subtle attack: trick dialog boxes ...  Modify or compromise system o Delete files, call system functions
  • 10. Port access restrictions : URL structure technically permits an arbitrary, non-standard TCP port to be specified for any request. Unfortunately, this permitted attackers to trick browsers into meaningfully interacting with network services that do not really understand HTTP . Because of this, a rather arbitrary subset of ports belonging to common network services is in modern days blocked. Browser Blocked Ports Firefox, Safari, Opera, Chrome, Android (tcpmux), (echo), (discard), (systat), (uucp), etc. Explorer , maxthon. (chargen), (ftp), (smtp), (pop3), (nntp), (imap2), (imap3), (ssl imap3)
  • 11. Verifier :  Byte code may not come from standard compiler. Harmful hacker may write dangerous byte code .  Verifier checks correctness of byte code. o Every instruction must have a valid operation code. o Every branch instruction must branch to the start of some other instruction, not middle of instruction . o Every method must have a structurally correct signature.
  • 12. Type Safety:  Load-time type checking.  Run-time type checking. o All casts are checked to make sure type safe. o All array references are checked to be within bounds. o References are tested to be not null before dereference.  Additional features. o Automatic garbage collection. o NO pointer arithmetic.
  • 13. Security Manager :  Java library functions call security manager.  Security manager object answers at run time.  Decide if calling code is allowed to do operation.  Examine protection domain of calling class. • Signer: organization that signed code before loading. • Location: URL where the Java classes came from. Uses the system policy to decide access permission
  • 14. Summary: Browser security :  Browser uses network and local disk. o Potential for outside access to local data.  Brower interprets code from network o HTML, JavaScript, ActiveX, Java.  Browser installs, executes plug-ins. o Acrobat, Shockwave .  Malicious code can pose risks. o Consume resources, Steal information, Compromise system