Secure Environment for Internet Browsing

Alexandru Tudor Gavrilescu

Abstract


The Internet is used by a large proportion of the population, but unfortunately their education regarding the usage of the instruments available is poor, resulting in potential informational frauds, especially in the financial field.

In this article I have approached a few simple problems, yet very important and frequently occurred, regarding the secure environment for Internet browsing, proposing solutions for each of them. The security methods are: anti-phishing; the prevention of SQL injection, through the verification of the data given as input in the Address Bar and in the password fields and blocking the access in case of a potential threat; a virtual keyboard for preventing the recording of the keys pressed (key loggers); the backup of the credentials in a local file and the encryption of it to prevent unauthorized access, the decryption of the data is made using a unique encryption key, owned by the user.

Keywords


phishing, virtual keyboard, web browser, cryptography, SQL injection, key logger, cookies

Full Text:

PDF

References


Bose and A. C. M. Leung, "Unveiling the mask of phishing: Threats, preventive measures, and responsibilities," communications of the Association for Information Systems, vol. 19, pp. 544-566, 2007.

L. Wenyin, G. Huang, L. Xiaoyue, Z. Min, and X. Deng, “Detection of phishing webpages based on visual similarity.”

Cezar A, “Securitatea in mediul internet”, Ed. Tehnica 2008

Constantin Popescu, “Introducere in criptografie” Universitatea Tehnica Oradea, 2009

Mircea F, “Tehnologii de securitatea alternative pentru aplicaţii în reţea” Universitatea Tehnica din Cluj Napoca, 2009

Web-Browser - http://en.wikipedia.org/wiki/Web_browser (accessed on 10.05.2013)

Usage share of web browsers, http://en.wikipedia.org/wiki/Usage_share_of_web_browsers (accessed on 10.05.2013)

http://www.securitatea-informatiilor.ro (accessed on 12.05.2013)

http://www.criminalitatea-informatica.ro (accessed on 13.05.2013)

http://press.pandasecurity.com (accessed on 13.05.2013)

Cookie - http://ro.wikipedia.org/wiki/Cookie (accessed on 13.05.2013)

http://stst.elia.pub.ro/news/RCI.../ZamfirNarcis/CIFR.doc (accessed on 14.05.2013)

Implementing a Web Browser with Phishing

Detection Techniques: http://arxiv.org/ftp/arxiv/papers/1110/1110.0360.pdf (accessed on 14.05.2013)

Anti-Phishing Techniques: http://www.ijera.com/papers/Vol2_issue2/BG22350355.pdf (accessed on 14.05.2013)


Refbacks

  • There are currently no refbacks.


Journal of Mobile, Embedded and Distributed Systems (JMEDS) ISSN: 2067 – 4074 (online)