To jump to these locations :
What is security on the Internet
What are security certificates
To view security certificates
What are security zones
To set a security level for each zone
Because there is wide variation in how trustworthy Web sites are, Internet Explorer enables you to assign any files you can open or download-from files on your computer to files on the Internet-to "security zones." You can set different levels of security depending on where Web information comes from and how much you trust it.
Many Internet sites are equipped to prevent unauthorized people from seeing the data sent to or from those sites. These are called "secure" sites. Because Internet Explorer supports the security protocols used by secure sites, you can send information to a secure site with safety and confidence. (A protocol is a set of rules and standards that enable computers to exchange information.) When you are viewing a page from a secure site, Internet Explorer displays a lock icon on the status bar.
Internet Explorer can also notify you when you are about to do something that might pose a security risk. For example, if you are about to send your credit-card number to an unsecure site, Internet Explorer can warn you that the site is not secure. If the site claims to be secure but its security credentials are suspect, Internet Explorer can warn you that the site might have been tampered with or might be misrepresenting itself.
The Internet works by sending information from computer to computer until the information reaches its destination. When information is sent from point A to point B, every computer in between has an opportunity to look at what's being sent. This can pose a security problem.
For example, suppose you are viewing a clothing catalog on the World Wide Web and you decide to buy a shirt. This requires that you type information into an order form, including your credit-card number. You know the clothing company in question is reputable, so you type your credit-card number and other information, and then send the completed form. Your information passes from computer to computer on its way to the clothing company. But suppose one of the computers in between has been infiltrated by criminals who watch the data passing through that computer until they see something interesting, such as your credit-card number.
Another security problem relates to how files and programs are sent and received between Web sites and your computer. With no security protection, you could run or download files and programs from the Internet that can damage your computer and the information stored on it.
How often do things like this happen? It's hard to say, but the important thing is that they're technically possible. And, as the Internet grows, they could happen more and more.
A certificate is a statement guaranteeing the identity of a person or the security of a Web site. Internet Explorer uses two different types of certificates.
Internet Explorer divides your Internet world into zones, so that you can assign a Web site to a zone with a suitable security level.
You can tell which zone the current Web page is in by looking at the right side of the Internet Explorer status bar. Whenever you attempt to open or download content from the Web, Internet Explorer checks the security settings for that Web site's zone.
There are four different zones:
In addition, any files already on your local computer are assumed to be completely safe, and no security settings are applied to them. This allows you to open and run files and programs on your computer without prompting or interruption. You cannot assign a folder or drive on your computer to a security zone.
Setting up security zones requires you to
How you assign security levels and Web sites is completely up to you. The actions for each level are already defined, but you can also create custom settings for the security level.
Generally, you would trust Web sites on an intranet the most, and would probably set your security setting to Low for that zone. Most programs could then be run or downloaded from those sites with little or no notification.
On the other hand, Web sites in the Restricted Sites zone may be those from which you want to avoid running or opening any scripts or active content.
![]() |
Note : For Help on an item, click at the top of the dialog box, and then click the item. |