Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword
Like this
90Activity
×
0 of .
Results for:
No results containing your search query
P. 1
Seguridad en Navegadores

Seguridad en Navegadores

Ratings: (0)|Views: 19,272|Likes:
Published by nazcabayongil

More info:

Published by: nazcabayongil on Apr 20, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, DOCX, TXT or read online from Scribd
See More
See less

07/10/2013

pdf

text

original

 
 
Comparativa de Seguridad ennavegadores de Internet en entornosWindows Vista o Windows 7
Versión: 1.119 de Abril de 2010Informática64
 
 
Contenido
Introducción............................................................................................................................. 4Opciones y características del navegador ................................................................................. 5Arquitectura y modo de ejecución del navegador ................................................................. 5Mandatority Integrity Control y UIPI ..................................................................................... 5DEP, ASLR y Virtual Store ...................................................................................................... 6Extensiones, administración y opciones de configuración ..................................................... 7Administración por GPO y Active Directory ........................................................................... 9Servidor Web y Aplicaciones............................................................................................... 10Control de Sesiones y cookies ............................................................................................. 10Cross Site Scripting (XSS) .................................................................................................... 12Clickjacking......................................................................................................................... 12Cross Domain Request........................................................................................................ 13Ingeniería Social ..................................................................................................................... 14Resaltado del dominio ........................................................................................................ 14Alertas sobre certificados ................................................................................................... 14Certificados con validación extendida ................................................................................. 17Almacén de certificados ..................................................................................................... 19Protección ante Phishing y Malware ................................................................................... 20Privacidad .......................................................................................................................... 22Gestión de la información de navegación ........................................................................... 22Configuración de JavaScript ................................................................................................ 23Vulnerabilidades .................................................................................................................... 24Google Chrome .................................................................................................................. 25Microsoft Internet Explorer 8.0 .......................................................................................... 26Mozilla Firefox .................................................................................................................... 27Opera Browser ................................................................................................................... 28Apple Safari ........................................................................................................................ 29
 
 Análisis de vulnerabilidades ................................................................................................... 30Número de vulnerabilidades............................................................................................... 30Vulnerabilidades según criticidad ....................................................................................... 32Vulnerabilidades corregidas ............................................................................................... 33Conclusiones finales ............................................................................................................... 34Google Chrome .................................................................................................................. 34Mozilla Firefox .................................................................................................................... 34Opera Browser ................................................................................................................... 35Apple Safari ........................................................................................................................ 35Microsoft Internet Explorer ................................................................................................ 35

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->