

Safe Browsing Practices
Presentation
•
Computers
•
12th Grade
•
Practice Problem
•
Medium
Ciara Williams
Used 2+ times
FREE Resource
46 Slides • 8 Questions
1
Safe Browsing Practices
When you use a computer and web browser to access pages and other resources over the Internet, you must consider the ways you can keep any information you transmit secure and prevent any malicious software (malware) from infecting your computer. There are a number of safe browsing practices that you should be aware of.
2
Using Free/Open Networks
Sometimes people connect to the Internet via an open or free network. This may be a commercial Wi-Fi network, operated by a cafe or made available in an airport or railway terminal, or wired Internet access available from a "web cafe." You might also find that your neighbor is operating an open Wi-Fi network or discover several open networks when you use your laptop in a park or other public space.
3
Using Free/Open Networks
When using a public workstation, you should always be alert to the possibility that it could be infected with malware. Clear the browser cache before shutting down or logging off, and make sure you do not allow passwords to be cached.If you operate a wireless network, it is important to secure it so that others do not make malicious use of it, for which you could be held responsible. Most ISPs make it a condition of service that you use your wireless router in a secure configuration
4
Malware Threats
The web browser is one of the most well-exploited vectors for infecting a system with malware or stealing information. Malware is malicious software threats and tools designed to vandalize or compromise computer systems. Malware can be categorized in a number of ways:
5
Malware Threats
Viruses and worms—malware principally designed to spread to other PCs.
Trojan Horse—an apparently legitimate application that conceals malicious functions, such as spyware or a bot allowing remote control of the PC.
Adware—software or configuration files installed with your agreement that helps a company track what pages you visit and display personalized adverts to you.
Spyware—malware installed covertly, possibly as a Trojan or as a result of a virus or worm infection, that tries to track everything you use the computer for. Spyware might record keystrokes, take screenshots of the desktop, or even hack the computer's camera and microphone.
6
Spyware and Adware Symptoms
Malware, such as adware and spyware, is designed with commercial or criminal intent rather than to vandalize the computer system. It can therefore be difficult to identify whether a computer is infected, because the malware may be designed to remain hidden.
7
Spyware and Adware Symptoms
Malware, such as adware and spyware, is designed with commercial or criminal intent rather than to vandalize the computer system. It can therefore be difficult to identify whether a computer is infected, because the malware may be designed to remain hidden.
8
Spyware and Adware Symptoms
Another symptom is redirection. This is where the user tries to open one page but gets sent to another. This may imitate the target page. Redirection attacks often target Internet search engines. In adware, redirection is just a blunt means of driving traffic through a site, but spyware may exploit it to capture authentication details.
9
Spyware and Adware Symptoms
You should also be wary of suspicious banner ads. A banner ad is an area of a website set aside for third-party advertising. The advert is inserted into a frame and can be hosted on a different server to that of the main site. Adverts for free anti-virus, or virus infection warnings, or system performance warnings are all likely to be bogus. In the worst cases, the ads could contain malicious code that will attempt to exploit any vulnerabilities in your OS or browser/plug-in software to infect your computer (a drive-by download).
10
Configuring Browsing Security
Malware may be able to infect your computer because OS or browser software is not up to date and is therefore vulnerable to some sort of exploit. You can only mitigate this type of threat by installing the latest software patches. There are other browser settings you can configure to ensure you are using the best safe browsing practices though.
11
Choosing a Compatible Browser
While the mainstream browsers are now much more standards-based, compatibility problems can still arise. It is often the case that you will need to have more than one browser installed on your computer. This is not ideal in security terms, as it is better to install as few applications as possible, but circumstances may demand it. Compatibility aside, your choice of browser is largely down to personal preference. Do make sure you choose a browser whose developer is active in monitoring security issues and providing software updates to fix them.
12
Active Content Types
HTTP is a limited protocol in terms of serving any content other than text and pictures. Many websites use active content to play video or add animated and interactive features. There are several ways of creating this type of content:
13
Multiple Choice
What is the general term for any unwanted software that has the potential to damage a system or impede performance?
Malware
Adware
Freeware
Shareware
14
Active Content Types
Scripting—scripts can run either on the server or on the client (browser) to perform quite sophisticated actions. Scripting is usually based on JavaScript. JavaScript can also be used to create browser add-ons.
Add-ons—animated or interactive content often uses a browser add-on. These are mini applications that work within the browser. There are many different add-ons, each working with a different type of content. Add-ons can also be used to extend or change the functionality of the browser by adding a custom toolbar for instance.
15
Active Content Types
Flash/Silverlight—these are two rival development environments, created by Adobe and Microsoft respectively, used to provide interactive web applications and video. The browser must have the Flash or Silverlight plug-in installed to view this type of content.
Java—unlike JavaScript, this is a fully-featured programming language used to develop sophisticated web applications. Java applications require the Java Virtual Machine to be installed on Windows and for the Java plug-in to be enabled in the browser.
16
Active Content Types
All of these technologies pose some degree of risk as they can be used for malicious purposes. When a web page needs to use active content and it is either not permitted to by current security settings or because the required plug-in is not installed, the browser displays a warning. Click the bar to install the component or change security settings.
17
Disabling Client Side Scripting
Most sites will use server-side scripting, meaning that code runs on the server to display the page you are looking at. There is no way to disable this. Many sites also depend on client-side scripting. This means that code is placed in the page itself and runs within the browser to change the way it looks or provide some other functionality
18
Managing Add-Ons
While scripting is usually left enabled, all browsers provide tools for managing add-ons. Add-ons come in several different types:
19
Managing Add-Ons
Extensions—these can add functionality to the browser. They might install a toolbar or change menu options. They can run scripts to interact with the pages you are looking at.
Plug-ins—these are designed to play some sort of content embedded in a web page, such as Flash, Silverlight, or other video/multimedia format. The plug-in can only interact with the multimedia object placed on the page, so it's more limited than an extension.
Themes—these change the appearance of the browser using custom images and color schemes.
20
Managing Add-Ons
The interface will also provide an option for browsing and installing add-ons, via the browser's store or portal, using the Get Add-ons link in the screenshot above. You can read reviews of the add-on and determine whether it will be useful and trustworthy. All extensions and plug-ins should be digitally signed by the developer to indicate that the code is as-published. You should be extremely wary of installing unsigned add-ons.
21
Managing Cookies & PII
While protecting against risks from malware and malicious add-ons, you also need to consider how your browser stores data and interacts with websites. Additionally, you need to consider how that website protects, or doesn't protect, your personal information.
22
Cookies
A cookie is a plain text file created by a website when you visit it. The purpose of cookies is to store session information so that the website can be personalized for you. For example, cookies may record information you type into forms, preferences you choose for the way the site works, and so on. They may also be used to display targeted advertising to you or collect information (metadata) about the browser you are using, your IP address, the links you click, how often you visit a site, and so on. An IP address can often be tied quite closely to a geographic location.
23
Cookies
This sort of information is referred to as Personally Identifiable Information (PII). Anyone able to collect this information might be able to track the sites you visit and work out where you live. You can configure browser settings to try to limit the way sites can gather PII from your browser.
24
Cookies
There are two classes of cookies:
First-party cookies—set by the domain you visit. For example, if you browse comptia.org and the server creates a cookie owned by comptia.org then this is a first-party cookie.
Third-party cookies—set by another domain. For example, if you browse comptia.org and a widget on the site tries to create a cookie for ad-track.com, this is a third-party cookie
25
Cookies
Cookies have the following privacy and security issues:
The site may record more information about you than you are aware, and information in the cookies may be shared with other sites. Sites should generally publish a privacy policy describing what information is collected and how it is used.
Cookies cannot spread malware, but if your computer is infected with a virus or a Trojan, it may be able to steal the information contained within cookies.
26
Cookies
Spyware and adware may make use of cookies to track what sites you visit and display targeted adverts.
Cookies should normally expire (self-delete) after a given date, but some try to set a date in the very distant future.
Confidential information, such as a password, should only be stored in a secure cookie (readable only under the SSL/TLS session it was created in).
27
Pop up Windows
A pop-up is a "sub-window" that appears over the main window. Pop-ups can be implemented using scripts or add-ons. A pop-up can be opened automatically by a script running on the page or in response to clicking a link. A different kind of overlay pop-up can be implemented using Cascading Style Sheets (CSS), which is HTML's extended formatting language. These don't open a new window but place some content in a layer above the main content so that you cannot view it without waiting for a timer to end or clicking a close icon.
28
Multiple Choice
What can a user do to prevent the browser from storing cookies or temporary files?
Use private browsing mode.
Set content filtering rules in proxy settings
Modify your User Account Control settings.
Upgrade web applications
29
Pop up Windows
Most of the time pop-ups are designed to be helpful to the user. For example, a form might use a pop-up window to explain what you are supposed to enter in a particular field without having to navigate away from the form and lose the information you have already entered.
30
Pop up Windows
Pop-ups are also used for advertising however. For example, a site may have some content you want to read and pop an advertising window over the top of it, so that you cannot read the content without first looking at the advert and closing it, or as the advertiser hopes, perhaps reading it, buying the product, then returning to the article. They are also used by subscription-based sites to prompt you to sign in with your account before you can view the content.
31
Pop up Windows
Aggressive use of pop-up windows is associated with spyware and adware. These spawn pop-ups when you open the browser, on every site you visit, and when you try to close the browser. They may even re-spawn when you try to close them. Malicious software can also use misleading pop-ups; for example, the Close button may try to execute a script that installs a virus or Trojan or the window may be designed to look like a Windows alert dialog ("Viruses have been detected on your computer—click OK to remove them").
32
Controlling Cookies/Pop-ups
You can control the use of cookies by the websites you visit using browser settings. There will be options to set what type of cookies to accept and how long to keep them. You can also configure exceptions so that certain domains are always or never allowed to create cookies. Finally, you can view which sites have created cookies and clear any data that you do not want to keep
33
Multiple Choice
What action can be taken to help validate that software comes from a legitimate source?
Installing the software on one computer at a time and watching for problems
Checking the number of stars in the review before downloading
Ensuring that driver software is digitally signed by the vendor
Verifying that the website uses HTTPS for encryption
34
Controlling Cookies/Pop-ups
As with scripting, disabling first-party cookies is likely to leave a website, and certainly a web application, unusable. Sites that depend on advertising can detect when you are blocking third-party cookies, pop-ups, and other advertising features and refuse to show the page content.
35
Controlling Cookies/Pop-ups
You can also choose to prevent sites from creating pop-up windows and configure exceptions for this rule. Note that this will not block all types of overlay pop-ups or advertising. If you want to have closer control over advertising on a site you need to install a suitable browser extension.
36
Disabling Autofill/Clearing Cache
Another privacy issue is that the browser can be set to store information typed into forms, including passwords, and retains a history of browsed pages. Any user using a publicly accessible computer should be trained to check these settings and to clear the browser cache before logging off. This is done from the browser's settings dialog or configuration page..
37
Private Browsing Mode
As these settings are relatively tricky to turn on and off, most browsers provide a private browsing mode. In private (or incognito) mode, the browser doesn't store cookies or temporary files and doesn't add pages to the history list. You can usually open a private browser tab by pressing CTRL+SHIFT+P (in Firefox) or CTRL+SHIFT+N (in Chrome). Private mode is indicated by a different icon and darker theme colors
38
Digital Certificates/Anti-phishing
When a web browser communicates with a secure (HTTPS) server, it accepts the server's digital certificate to use its public key to encrypt communications. Because of the special way that the keys are linked, the public key cannot be used to decrypt the message once encrypted. Only the linked private key can be used to do that. The private key must be kept secret. This is referred to as asymmetric encryption.
39
Digital Certificates/Anti-phishing
Having a certificate is not in itself any proof of identity. The browser and server rely upon a third-party—the Certificate Authority (CA)—to vouch for the server's identity. This framework is called Public Key Infrastructure (PKI).A browser is pre-installed with a number of root certificates that are automatically trusted. These represent the commercial CAs that grant certificates to most of the companies that do business on the web.
40
Valid/Invalid Certificates
When you browse a site using a certificate, the browser displays the information about the certificate in the address bar:
If the certificate is valid and trusted, a padlock icon is shown. Click the icon to view information about the certificate and the Certificate Authority guaranteeing it.
If the certificate is highly trusted, the address bar is colored green. High assurance certificates make the website owner go through a (even) more rigorous identity validation procedure.
If the certificate is untrusted or otherwise invalid, the address bar is colored maroon and the site is blocked by a warning message. If you want to trust the site anyway, click through the warning.
41
Suspicious Links/URL's
Another important step in validating the identity of a site is to confirm its domain name. Techniques to direct users to fake or manipulated websites are called phishing and pharming. These depend on making a fake site look like the real one. One trick is to use well-known subdomains as part of the address. For example, "comptia.phishing.org" has nothing to do with "comptia.org" but may fool the unwary into thinking it does. The browser highlights the registered domain part of the address so that you can verify it..
42
Enabling a Firewall
A firewall restricts access to a computer or network to a defined list of hosts and applications. Basic packet filtering firewalls work on the basis of filtering network data packets as they try to pass into or out of the machine.
43
Multiple Choice
How do you know if a certificate is valid on your browser?
The screen will turn blue
You won't see anything at all
A padlock icon is shown
The address bar is colored maroon and a warning message is displayed.
44
Multiple Choice
What typically happens when you visit a website that does not have a valid digital certificate?
The browser will ask if you want to create a digital certificate for the website
The browser will display a yellow alert in the system tray and then load the page.
The browser will load the page and then inform you that the site does not have a valid certificate.
The browser will display an invalid certificate warning and ask if you want to proceed.
45
Types of Firewalls
On a TCP/IP network, each host is identified by an IP address, while each application protocol (HTTP, FTP, SMTP, and so on) is identified by a port number. Packet filters on a firewall can be applied to IP addresses and port numbers. A more advanced firewall (stateful inspection) can analyze the contents of network data packets, so long as they are not encrypted, and block them if any suspicious signatures are detected and identify suspicious patterns of activity.
46
Types of Firewalls
A hardware firewall is a dedicated appliance with the firewall installed as firmware. A software firewall is installed as an application on a workstation or server. Most Internet routers also feature a built-in firewall, configured via the web management interface.A simple host firewall (or personal firewall) may be installed on a client PC to protect it. Windows features such a firewall. There are also numerous third-party host firewalls.
47
Configuring Windows Defender
Windows Defender Firewall is enabled on all network connections by default unless it has been replaced by a third-party firewall. It is not a good idea to run two host firewalls at the same time because they can conflict with each other, would be unnecessarily complex to configure, and more difficult to troubleshoot.
48
Configuring Windows Defender
To configure the firewall, open Windows Defender Security Center and then click the Firewall & network protection node. Use the links to configure the settings. For example, to allow an app through the firewall, click Allow an app through the firewall..You can also access Windows Defender Firewall settings by using the Control Panel Windows Defender Firewall applet
49
Multiple Choice
Which is NOT a legitimate source for obtaining setup files or device drivers?
Vendor app stores such as the Apple App Store
Merchant app stores such as the Amazon Appstore
50
Configuring Windows Defender
To turn off the firewall, which is only advisable if you are using an alternative host firewall software product, in Settings, click the active network and then click the On button to turn off the firewall. In Control Panel, click the Turn Windows Defender Firewall on or off link. You can then configure the required settings, as shown below
51
Configuring Proxy Settings
On an enterprise network, a network firewall is likely to be deployed to monitor and control all traffic passing between the local network and the Internet. On networks like this, clients might not be allowed to connect to the Internet directly but forced to use a proxy server instead. The proxy server can be configured as a firewall and apply other types of content filtering rules.
52
Multiple Choice
What protects a network by denying specific types of incoming traffic?
Antivirus software
Diagnostic software
A firewall appliance
A TCP/IP accelerator appliance
53
Configuring Proxy Settings
Some proxy servers work transparently so that clients use them without any extra configuration of the client application. Other proxies require that client software, such as the browser, be configured with the IP address and port of the proxy server. This information would be provided by the network administrator.
54
Multiple Choice
A software firewall that is capable of content filtering can perform what action?
Place the client session on hold while retrieving content on behalf of the client
Allow or deny specific attachment and payload types, keywords, and file formats
Monitor an entire session of Transmission Control Protocol (TCP) from start to finish
Perform stateless inspection of each individual packet against a pre-defined rule set
Safe Browsing Practices
When you use a computer and web browser to access pages and other resources over the Internet, you must consider the ways you can keep any information you transmit secure and prevent any malicious software (malware) from infecting your computer. There are a number of safe browsing practices that you should be aware of.
Show answer
Auto Play
Slide 1 / 54
SLIDE
Similar Resources on Wayground
50 questions
02/26/2025 Shifters of Demand and Supply
Lesson
•
12th Grade - University
47 questions
How a Bill Becomes a Law
Lesson
•
11th - 12th Grade
50 questions
The Executive Branch
Lesson
•
12th Grade
49 questions
Unit 2: Functions Review
Lesson
•
8th Grade
48 questions
Final Grammar Review Book 5 Q3
Lesson
•
University
49 questions
Utility Program
Lesson
•
University
50 questions
L1: Flowcharts-and-pseudoco
Lesson
•
12th Grade
49 questions
Лекција 70.71.72. ОРС
Lesson
•
12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade