Web browsers are capable of parsing active code in many forms, including JavaScript, ActiveX, and Java code. These are automatically downloaded and executed by web browser. Malicious individuals often take advantage of this to attack systems, distribute malicious code, or negatively impact systems. Microsoft Internet Explorer (IE) is installed as a default component of Windows Operating System and is closely integrated with it. Because of this, an exploitation of IE can seriously impact the underlying Windows installation, so it is critical to stay current with all IE updates. IE updates can be acquired through
the Windows Update and Automatic updates features as described earlier.
Security Zones
Iinternet Explorer uses a capabilities/trust model called Zone Security. In this model, Web sites are permitted to perform certain actions based on the following zones.
Restricted sites Zone: This zone contains web sites that could potentially damage user’s data. Trusted sites zone: This zone contains web sites that user can trust not to damage his computer or data. Local Intranet Zone: This zone contains all web sites that are on organization’s intranet. Internet Zone: This zone contains all web sites that user haven’t placed in other zones.
the Windows Update and Automatic updates features as described earlier.
Security Zones
Iinternet Explorer uses a capabilities/trust model called Zone Security. In this model, Web sites are permitted to perform certain actions based on the following zones.
Restricted sites Zone: This zone contains web sites that could potentially damage user’s data. Trusted sites zone: This zone contains web sites that user can trust not to damage his computer or data. Local Intranet Zone: This zone contains all web sites that are on organization’s intranet. Internet Zone: This zone contains all web sites that user haven’t placed in other zones.