0% found this document useful (0 votes)
409 views5 pages

EX8:-study of Web Browsers, Search Engines and Cyber Hygiene

The document discusses web browsers, search engines, and cyber hygiene. It defines web browsers and their functions, lists examples of popular browsers from the early 1990s to today, and describes how search engines and cyber hygiene best practices are important for internet and data security.

Uploaded by

Jalaj Baghwala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
409 views5 pages

EX8:-study of Web Browsers, Search Engines and Cyber Hygiene

The document discusses web browsers, search engines, and cyber hygiene. It defines web browsers and their functions, lists examples of popular browsers from the early 1990s to today, and describes how search engines and cyber hygiene best practices are important for internet and data security.

Uploaded by

Jalaj Baghwala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

EX8 :- study of web browsers, search

engines and Cyber Hygiene


Web Browser :- A software application used to access information
on the World Wide Web is called a Web Browser. When a user requests
some information, the web browser fetches the data from a web server and
then displays the webpage on the user’s screen.

Functions of Web Browser :-


Our dependency on the Internet has massively increased. Stated below are functions of
web browsers and how are they useful:

 The main function is to retrieve information from the World Wide Web and
making it available for users
 Visiting any website can be done using a web browser. When a URL is entered
in a browser, the web server takes us to that website
 To run Java applets and flash content, plugins are available on the web browser
 It makes Internet surfing easy as once we reach a website we can easily check
the hyperlinks and get more and more useful data online
 Browsers user internal cache which gets stored and the user can open the same
webpage time and again without losing extra data 
 Multiple webpages can be opened at the same time on a web browser
 Options like back, forward, reload, stop reload, home, etc. are available on these
web browsers, which make using them easy and convenient.

Types of Web Browser :-


The functions of all web browsers are the same. Thus, more than the different types there are
different web browsers which have been used over the years.
Discussed below are different web browser examples and their specific features:
1. WorldWideWeb

 The first web browser ever


 Launched in 1990
 It was later named “Nexus” to avoid any confusion with the World Wide Web
 Had the very basic features and less interactive in terms of graphical interface
 Did not have the feature of bookmark
2. Mosaic
 It was launched in 1993
 The second web browser which was launched
 Had a better graphical interface. Images, text and graphics could all be integrated
 It was developed at the National Center for Supercomputing Applications
 The team which was responsible for creating Mosaic was lead by Marc Andreessen
 It was named “the world’s first popular browser”
3. Netscape Navigator

 It was released in 1994


 In the 1990s, it was the dominant browser in terms of usage share
 More versions of this browser were launched by Netscape
 It had an advanced licensing scheme and allowed free usage for non-commercial
purposes
4. Internet Explorer

 It was launched in 1995 by Microsoft


 By 2003, it has attained almost 95% of usage share and had become the most popular
browsers of all
 Close to 10 versions of Internet Explorer were released by Microsoft and were updated
gradually
 It was included in the Microsoft Windows operating system
 In 2015, it was replaced with “Microsoft Edge”, as it became the default browser on
Windows 10
5. Firefox

 It was introduced in 2002 and was developed by Mozilla Foundation


 Firefox overtook the usage share from Internet Explorer and became the dominant
browser during 2003-04
 Location-aware browsing was made available with Firefox
 This browser was also made available for mobile phones, tablets, etc.
6. Google Chrome

 It was launched in 2008 by Google


 It is a cross-platform web browser
 Multiple features from old browsers were amalgamated to form better and newer
features
 To save computers from malware, Google developed the ad-blocking feature to keep the
user data safe and secure
 Incognito mode is provided where private searching is available where no cookies or
history is saved
 Till date, it has the best user interface
Search Engine :- A search engine is a kind of website through which users can search
the content available on the Internet. For this purpose, users enter the desired keywords into
the search field. Then the search engine looks through its index for relevant web pages and
displays them in the form of a list. The Internet is a huge source of information & resources
and to access the resource from the Internet there are some kinds of software, this softwares
are known as Search Engine. Some of the popular ones are: Google, Bing, Yahoo, Duck
duck go, Baidu, etc.

There are three main components of the Search engine:


 Crawler: Crawlers are software programs sometimes referred to the bots. It regularly
scans the websites automatically for URLs, keywords, and links in order to discover the
new updates. The crawler can follow the links present on some other webpage.
 Index: As we know, the Crawler continuously scans the websites, it develops an index
of URLs, links and keywords to make the search results more effective.
 Search Algorithm: The search algorithm is the complete mechanism behind the
whole searching process. It is working by searching for the index and finding for the most
suitable webpages by matching keywords that are searched by the users.

cyber hygiene :- Cyber hygiene (or cybersecurity hygiene) is a cybersecurity


practice that maintains the basic health and security of hardware and software. Cyber hygiene is
a joint precautionary measure performed by an organization's security practitioner, computer
system administrator and users to help protect from attacks. The basic practice aids in
maintaining and protecting already properly functioning devices, ensuring they are protected
from threats such as malware.

Cyber hygiene aims to keep any sensitive data organized and secure it from theft or attacks.
The concept works similarly to personal hygiene, where an individual maintains their health by
taking precautionary measures that would help ensure their health. If an individual neglects their
health, they might catch a cold. If an organization neglects cyber hygiene, then it could lead to a
virus and data breach.

In order to know what is on an organization's network and how it's associated with risk, an
organization needs to develop a cyber resilience plan that can evaluate their cyber hygiene.

Why is cyber hygiene important?

Creating a routine around cyber hygiene helps ensure a system's health by enabling practices that
continually help prevent cybercriminals from causing security breaches, installing malware or
stealing personal information. Having proper cyber hygiene also ensures better incident response if
a successful attack occurs.
Organizations that rely on only cybersecurity professionals to protect their network and devices
ignore the role an individual employee or the end user can have in ensuring security. If employees
and end users understand basic cyber hygiene practices, they can play a larger role in protecting
and maintaining their devices and networks

Cyber hygiene best practices :-


To have good cyber hygiene, an organization must have a set of practices and workflows to follow
regarding cybersecurity. Some best practices to follow regarding cyber hygiene include:

 Create a cyber hygiene policy. Creating a common set of practices to maintain cyber hygiene
will make it easier to maintain hardware and software.

 Document all equipment, hardware and software. Create a list of hardware, software and
web applications used. Manage any newer installs, so they are kept track of and updated when
needed.

 Inspect the list to find unused or outdated software and hardware that could have
vulnerabilities. Uninstall outdated and unused hardware and software.

 Update all software or hardware that have updates available.

 Ensure antivirus and antimalware software is properly installed and configured.

 Ensure proper password management.

 Limit those who have administrative access to the network.

 Make sure routers and firewalls are properly set up and configured.

 Use two-factor authentication (2FA) or multifactor authentication (MFA).

 Physically segment computer networks.

 Have an on-call list of workers who can respond to security events.

 Keep up to date on cyber hygiene best practices.

You might also like