Cyber Security Primer X
SAFE BROWSING
Understanding Your Computer:
Web Browsers
How do web browsers work?
A web browser is an application that finds and displays web
pages. It coordinates communication between your computer and the web server
where a particular website "lives."
When you open your browser and type in a web address (URL)
for a website, the browser submits a request to the server, or servers, that
provide the content for that page. The browser then processes the code from the
server (written in a language such as HTML, JavaScript, or XML) and loads any
other elements (such as Flash, Java, or ActiveX) that are necessary to generate
content for the page. After the browser has gathered and processed all of the
components, it displays the complete, formatted web page. Every time you
perform an action on the page, such as clicking buttons and following links,
the browser continues the process of requesting, processing, and presenting
content.
How many browsers are there?
There are many different browsers. Most users are familiar
with graphical browsers, which display both text and graphics and may also
display multimedia elements such as sound or video clips. However, there are
also text-based browsers. The following are some well-known browsers:
• Internet Explorer
• Firefox
• AOL
• Opera
• Safari - a browser specifically designed for Macintosh computers
• Lynx - a text-based browser desirable for vision-impaired users
because of the availability of special devices that read the text
How do you choose a browser?
A browser is usually included with the installation of your
operating system, but you are not restricted to that choice. Some of the
factors to consider when deciding which browser best suits your needs include
• compatibility - Does the browser work with your operating
system?
• security - Do you feel that your browser offers you the level of
security you want?
• ease of use - Are the menus and options easy to understand and
use?
• functionality - Does the browser interpret web content
correctly? If you need to install other plug-ins or devices to translate
certain types of content, do they work?
• appeal - Do you find the interface and way the browser
interprets web content visually appealing?
Can you have more than one
browser installed at the same time?
If you decide to change your browser or add another one,
you don't have to uninstall the browser that's currently on your computer—you
can have more than one browser on your computer at once. However, you will be
prompted to choose one as your default browser. Anytime you follow a link in an
email message or document, or you double-click a shortcut to a web page on your
desktop, the page will open using your default browser. You can manually open
the page in another browser.
Most vendors give you the option to download their browsers
directly from their websites. Make sure to verify the authenticity of the site
before downloading any files. To further minimize risk, follow other good
security practices, like using a firewall and keeping anti-virus software up to
date.
Evaluating Your Web Browser's
Security Settings
Why are security settings for
web browsers important?
Your web browser is your primary connection to the rest of
the internet, and multiple applications may rely on your browser, or elements
within your browser, to function. This makes the security settings within your
browser even more important. Many web applications try to enhance your browsing
experience by enabling different types of functionality, but this functionality
might be unnecessary and may leave you susceptible to being attacked. The
safest policy is to disable the majority of those features unless you decide
they are necessary. If you determine that a site is trustworthy, you can choose
to enable the functionality temporarily and then disable it once you are
finished visiting the site.
Where can you find the
settings?
Each web browser is different, so you may have to look
around. For example, in Internet Explorer, you can find them by clicking Tools
on your menu bar, selecting Internet Options..., choosing the Security tab, and
clicking the Custom Level... button. However, in Firefox, you click Tools on
the menu bar and select Options.... Click the Content, Privacy, and Security
tabs to explore the basic security options. Browsers have different security
options and configurations, so familiarize yourself with the menu options,
check the help feature, or refer to the vendor's web site.
While every application has settings that are selected by
default, you may discover that your browser also has predefined security levels
that you can select. For example, Internet Explorer offers custom settings that
allow you to select a particular level of security; features are enabled or
disabled based on your selection. Even with these guides, it is helpful to have
an understanding of what the different terms mean so that you can evaluate the
features to determine which settings are appropriate for you.
How do you know what your
settings should be?
Ideally, you would set your security for the highest level
possible. However, restricting certain features may limit some web pages from loading
or functioning properly. The best approach is to adopt the highest level of
security and only enable features when you require their functionality.
What do the different terms
mean?
Different browsers use different terms, but here are some
terms and options you may find:
• Zones - Your browser may give you the option of putting
web sites into different segments, or zones, and allow you to define different
security restrictions for each zone. For example, Internet Explorer identifies
the following zones:
o Internet
- This is the general zone for all public web sites. When you browse the
internet, the settings for this zone are automatically applied to the sites you
visit. To give you the best protection as you browse, you should set the
security to the highest level; at the very least, you should maintain a medium
level.
o Local
intranet - If you are in an office setting that has its own intranet, this zone
contains those internal pages. Because the web content is maintained on an
internal web server, it is usually safe to have less restrictive settings for
these pages. However, some viruses have tapped into this zone, so be aware of
what sites are listed and what privileges they are being given.
o Trusted
sites - If you believe that certain sites are designed with security in mind,
and you feel that content from the site can be trusted not to contain malicious
materials, you can add them to your trusted sites and apply settings
accordingly. You may also require that only sites that implement Secure Sockets
Layer (SSL) can be active in this zone. This permits you to verify that the
site you are visiting is the site that it claims to be. This is an optional
zone but may be useful if you personally maintain multiple web sites or if your
organization has multiple sites. Even if you trust them, avoid applying low
security levels to external sites—if they are attacked, you might also become a
victim.
o Restricted
sites - If there are particular sites you think might not be safe, you can
identify them and define heightened security settings. Because the security
settings may not be enough to protect you, the best precaution is to avoid
navigating to any sites that make you question whether or not they're safe.
• JavaScript - Some web sites rely on web scripts such as
JavaScript to achieve a certain appearance or functionality, but these scripts
may be used in attacks.
• Java and ActiveX controls - These programs are used to
develop or execute active content that provides some functionality, but they
may put you at risk.
• Plug-ins - Sometimes browsers require the installation of
additional software known as plug-ins to provide additional functionality. Like
Java and ActiveX controls, plug-ins may be used in an attack, so before
installing them, make sure that they are necessary and that the site you have
to download them from is trustworthy.
You may also find options that allow you to take the
following security measures:
• Manage cookies - You can disable, restrict, or allow
cookies as appropriate. Generally, it is best to disable cookies and then
enable them if you visit a site you trust that requires them.
• Block pop-up windows - Although turning this feature on
could restrict the functionality of certain web sites, it will also minimize
the number of pop-up ads you receive, some of which may be malicious.
Shopping Safely Online
Why do online shoppers have to
take special precautions?
The Internet offers a convenience that is not available
from any other shopping outlet. From the comfort of your home, you can search
for items from countless vendors, compare prices with a few simple mouse
clicks, and make purchases without waiting in line. However, the Internet is
also convenient for attackers, giving them multiple ways to access the personal
and financial information of unsuspecting shoppers. Attackers who are able to
obtain this information may use it for their own financial gain, either by
making purchases themselves or by selling the information to someone else.
How do attackers target online
shoppers?
There are three common ways that attackers can take
advantage of online shoppers:
• Targeting vulnerable computers - If you do not take steps
to protect your computer from viruses or other malicious code, an attacker may
be able to gain access to your computer and all of the information on it. It is
also important for vendors to protect their computers to prevent attackers from
accessing customer databases.
• Creating fraudulent sites and email messages - Unlike
traditional shopping, where you know that a store is actually the store it
claims to be, attackers can create malicious web sites that mimic legitimate
ones or create email messages that appear to have been sent from a legitimate
source. Charities may also be misrepresented in this way, especially after
natural disasters or during holiday seasons. Attackers create these malicious
sites and email messages to try to convince you to supply personal and
financial information.
• Intercepting insecure transactions - If a vendor does not
use encryption, an attacker may be able to intercept your information as it is
being transmitted.
How can you protect yourself?
• Use and maintain anti-virus software, a firewall, and
anti-spyware software - Protect yourself against viruses and Trojan horses that
may steal or modify the data on your own computer and leave you vulnerable by
using anti-virus software and a firewall. Make sure to keep your virus
definitions up to date. Spyware or adware hidden in software programs may also
give attackers access to your data, so use a legitimate anti-spyware program to
scan your computer and remove any of these files.
• Keep software, particularly your web browser, up to date -
Install software patches so that attackers cannot take advantage of known
problems or vulnerabilities. Many operating systems offer automatic updates. If
this option is available, you should enable it.
• Evaluate your software's settings - The default settings of most
software enable all available functionality. However, attackers may be able to
take advantage of this functionality to access your computer. It is especially
important to check the settings for software that connects to the Internet
(browsers, email clients, etc.). Apply the highest level of security available
that still gives you the functionality you need.
• Do business with reputable vendors - Before providing any
personal or financial information, make sure that you are interacting with a
reputable, established vendor. Some attackers may try to trick you by creating
malicious web sites that appear to be legitimate, so you should verify the
legitimacy before supplying any information. Locate and note phone numbers and
physical addresses of vendors in case there is a problem with your transaction
or your bill.
• Take advantage of security features - Passwords and other
security features add layers of protection if used appropriately.
• Be wary of emails requesting information - Attackers may attempt
to gather information by sending emails requesting that you confirm purchase or
account information. Legitimate businesses will not solicit this type of
information through email.
• Check privacy policies - Before providing personal or financial
information, check the web site's privacy policy. Make sure you understand how
your information will be stored and used.
• Make sure your information is being encrypted - Many sites use
SSL, or secure sockets layer, to encrypt information. Indications that your
information will be encrypted include a URL that begins with "https:"
instead of "http:" and a padlock icon. If the padlock is closed, the
information is encrypted. The location of the icon varies by browser; for
example, it may be to the right of the address bar or at the bottom of the
window. Some attackers try to trick users by adding a fake padlock icon, so
make sure that the icon is in the appropriate location for your browser.
• Use a credit card - There are laws to limit your liability for
fraudulent credit card charges, and you may not have the same level of
protection for your debit card. Additionally, because a debit card draws money
directly from your bank account, unauthorized charges could leave you with
insufficient funds to pay other bills. You can further minimize damage by using
a single credit card with a low credit line for all of your online purchases.
• Check your statements - Keep a record of your purchases and
copies of confirmation pages, and compare them to your bank statements. If
there is a discrepancy, report it immediately.
Browsing Safely: Understanding
Active Content and Cookies
What is active content?
To increase functionality or add design embellishments, web
sites often rely on scripts that execute programs within the web browser. This
active content can be used to create "splash pages" or options like
drop-down menus. Unfortunately, these scripts are often a way for attackers to
download or execute malicious code on a user's computer.
• JavaScript - JavaScript is just one of many web scripts
(other examples are VBScript, ECMA Script, and JScript) and is probably the
most recognized. Used on almost every web site now, JavaScript and other
scripts are popular because users expect the functionality and "look"
that it provides, and it's easy to incorporate (many common software programs
for building web sites have the capability to add JavaScript features with
little effort or knowledge required of the user). However, because of these
reasons, attackers can manipulate it to their own purposes. A popular type of
attack that relies on JavaScript involves redirecting users from a legitimate
web site to a malicious one that may download viruses or collect personal
information.
• Java and ActiveX controls - Different from JavaScript,
Java and ActiveX controls are actual programs that reside on your computer or
can be downloaded over the network into your browser. If executed by attackers,
untrustworthy ActiveX controls may be able to do anything on your computer that
you can do (such as running spyware and collecting personal information,
connecting to other computers, and potentially doing other damage). Java
applets usually run in a more restricted environment, but if that environment
isn't secure, then malicious Java applets may create opportunities for attack
as well.
JavaScript and other forms of active content are not always
dangerous, but they are common tools for attackers. You can prevent active
content from running in most browsers, but realize that the added security may
limit functionality and break features of some sites you visit. Before clicking
on a link to a web site that you are not familiar with or do not trust, take
the precaution of disabling active content.
These same risks may also apply to the email program you
use. Many email clients use the same programs as web browsers to display HTML,
so vulnerabilities that affect active content like JavaScript and ActiveX often
apply to email. Viewing messages as plain text may resolve this problem.
What are cookies?
When you browse the Internet, information about your computer
may be collected and stored. This information might be general information
about your computer (such as IP address, the domain you used to connect (e.g.,
.edu, .com, .net), and the type of browser you used). It might also be more
specific information about your browsing habits (such as the last time you
visited a particular web site or your personal preferences for viewing that
site).
Cookies can be saved for varying lengths of time:
• Session cookies - Session cookies store information only
as long as you're using the browser; once you close the browser, the
information is erased. The primary purpose of session cookies is to help with
navigation, such as by indicating whether or not you've already visited a
particular page and retaining information about your preferences once you've
visited a page.
• Persistent cookies - Persistent cookies are stored on
your computer so that your personal preferences can be retained. In most
browsers, you can adjust the length of time that persistent cookies are stored.
It is because of these cookies that your email address appears by default when
you open your Yahoo! or Hotmail email account, or your personalized home page
appears when you visit your favorite online merchant. If an attacker gains
access to your computer, he or she may be able to gather personal information
about you through these files.
To increase your level of security, consider adjusting your
privacy and security settings to block or limit cookies in your web browser. To
make sure that other sites are not collecting personal information about you
without your knowledge, choose to only allow cookies for the web site you are
visiting; block or limit cookies from a third-party. If you are using a public
computer, you should make sure that cookies are disabled to prevent other
people from accessing or using your personal information.
Understanding Web Site
Certificates
What are web site
certificates?
If an organization wants to have a secure web site that
uses encryption, it needs to obtain a site, or host, certificate. Some steps
you can take to help determine if a site uses encryption are to look for a
closed padlock in the status bar at the bottom of your browser window and to
look for "https:" rather than "http:" in the URL. By making
sure a web site encrypts your information and has a valid certificate, you can
help protect yourself against attackers who create malicious sites to gather
your information. You want to make sure you know where your information is
going before you submit anything.
If a web site has a valid certificate, it means that a
certificate authority has taken steps to verify that the web address actually
belongs to that organization. When you type a URL or follow a link to a secure
web site, your browser will check the certificate for the following
characteristics:
1. the web site address matches the address on the certificate
2. the certificate is signed by a certificate authority that the
browser recognizes as a "trusted" authority
Can you trust a certificate?
The level of trust you put in a certificate is connected to
how much you trust the organization and the certificate authority. If the web
address matches the address on the certificate, the certificate is signed by a
trusted certificate authority, and the date is valid, you can be more confident
that the site you want to visit is actually the site that you are visiting.
However, unless you personally verify that certificate's unique fingerprint by
calling the organization directly, there is no way to be absolutely sure.
When you trust a certificate, you are essentially trusting
the certificate authority to verify the organization's identity for you.
However, it is important to realize that certificate authorities vary in how
strict they are about validating all of the information in the requests and
about making sure that their data is secure. By default, your browser contains
a list of more than 100 trusted certificate authorities. That means that, by
extension, you are trusting all of those certificate authorities to properly
verify and validate the information. Before submitting any personal
information, you may want to look at the certificate.
How do you check a certificate?
There are two ways to verify a web site's certificate in
Internet Explorer or Mozilla. One option is to click on the padlock in the
status bar of your browser window. However, your browser may not display the
status bar by default. Also, attackers may be able to create malicious web
sites that fake a padlock icon and display a false dialog window if you click
that icon. A more secure way to find information about the certificate is to
look for the certificate feature in the menu options. This information may be
under the file properties or the security option within the page information.
You will get a dialog box with information about the certificate, including the
following:
• who issued the certificate - You should make sure that
the issuer is a legitimate, trusted certificate authority (you may see names
like VeriSign, thawte, or Entrust). Some organizations also have their own
certificate authorities that they use to issue certificates to internal sites
such as intranets.
• who the certificate is issued to - The certificate should
be issued to the organization who owns the web site. Do not trust the
certificate if the name on the certificate does not match the name of the
organization or person you expect.
• expiration date - Most certificates are issued for one or
two years. One exception is the certificate for the certificate authority
itself, which, because of the amount of involvement necessary to distribute the
information to all of the organizations who hold its certificates, may be ten
years. Be wary of organizations with certificates that are valid for longer
than two years or with certificates that have expired.
When visiting a web site, you may have been presented with
a dialog box that claims that there is an error with the site certificate. This
may happen if the name the certificate is registered to does not match the site
name, you have chosen not to trust the company who issued the certificate, or
the certificate has expired. You will usually be presented with the option to
examine the certificate, after which you can accept the certificate forever,
accept it only for that particular visit, or choose not to accept it. The
confusion is sometimes easy to resolve (perhaps the certificate was issued to a
particular department within the organization rather than the name on file). If
you are unsure whether the certificate is valid or question the security of the
site, do not submit personal information. Even if the information is encrypted,
make sure to read the organization's privacy policy first so that you know what
is being done with that information.
Understanding
Internationalized Domain Names
What are internationalized
domain names?
To decrease the amount of confusion surrounding different
languages, there is a standard for domain names within web browsers. Domain
names are included in the URL (or web address) of web site. This standard is
based on the Roman alphabet (which is used by the English language), and
computers convert the various letters into numerical equivalents. This code is
known as ASCII (American Standard Code for Information Interchange). However,
other languages include characters that do not translate into this code, which
is why internationalized domain names were introduced.
To compensate for languages that incorporate special
characters (such as Spanish, French or German) or rely completely on character
representation (such as Asian or Arabic languages), a new system had to be
developed. In this new system, the base URL (which is usually the address for
the home page) is dissected and converted into a format that is compatible with
ASCII. The resulting URL (which contains the string "xn--" as well as
a combination of letters and numbers) will appear in your browser's status bar.
In newer versions of many browsers, it will also appear in the address bar.
What are some security
concerns?
Attackers may be able to take advantage of
internationalized domain names to initiate phishing attacks (see Avoiding
Social Engineering and Phishing Attacks for more information). Because there
are certain characters that may appear to be the same but have different ASCII
codes (for example, the Cyrillic "a" and the Latin "a"), an
attacker may be able to "spoof" a web page URL. Instead of going to a
legitimate site, you may be directed to a malicious site, which could look
identical to the real one. If you submit personal or financial information
while on the malicious site, the attacker could collect that information and
then use and/or sell it.
How can you protect yourself?
• Type a URL instead of following a link - Typing a URL
into a browser rather than clicking a link within a web page or email message
will minimize your risk. By doing this, you are more likely to visit the
legitimate site rather than a malicious site that substitutes similar-looking
characters.
• Keep your browser up to date - Older versions of browsers
made it easier for attackers to spoof URLs, but most newer browsers incorporate
certain protections. Instead of displaying the URL that you "think"
you are visiting, most browsers now display the converted URL with the
"xn--" string.
• Check your browser's status bar - If you move your mouse
over a link on a web page, the status bar of your browser will usually display
the URL that the link references. If you see a URL that has an unexpected
domain name (such as one with the "xn--" string mentioned above), you
have likely encountered an internationalized domain name. If you were not
expecting an internationalized domain name or know that the legitimate site
should not need one, you may want to reconsider visiting the site. Browsers
such as Mozilla and Firefox include an option in their security settings about
whether to allow the status bar text to be modified. To prevent attackers from
taking advantage of JavaScript to make it appear that you are on a legitimate
site, you may want to make sure this option is not enabled.
Comments
Post a Comment