EX8:-study of Web Browsers, Search Engines and Cyber Hygiene
EX8:-study of Web Browsers, Search Engines and Cyber Hygiene
The main function is to retrieve information from the World Wide Web and
making it available for users
Visiting any website can be done using a web browser. When a URL is entered
in a browser, the web server takes us to that website
To run Java applets and flash content, plugins are available on the web browser
It makes Internet surfing easy as once we reach a website we can easily check
the hyperlinks and get more and more useful data online
Browsers user internal cache which gets stored and the user can open the same
webpage time and again without losing extra data
Multiple webpages can be opened at the same time on a web browser
Options like back, forward, reload, stop reload, home, etc. are available on these
web browsers, which make using them easy and convenient.
Cyber hygiene aims to keep any sensitive data organized and secure it from theft or attacks.
The concept works similarly to personal hygiene, where an individual maintains their health by
taking precautionary measures that would help ensure their health. If an individual neglects their
health, they might catch a cold. If an organization neglects cyber hygiene, then it could lead to a
virus and data breach.
In order to know what is on an organization's network and how it's associated with risk, an
organization needs to develop a cyber resilience plan that can evaluate their cyber hygiene.
Creating a routine around cyber hygiene helps ensure a system's health by enabling practices that
continually help prevent cybercriminals from causing security breaches, installing malware or
stealing personal information. Having proper cyber hygiene also ensures better incident response if
a successful attack occurs.
Organizations that rely on only cybersecurity professionals to protect their network and devices
ignore the role an individual employee or the end user can have in ensuring security. If employees
and end users understand basic cyber hygiene practices, they can play a larger role in protecting
and maintaining their devices and networks
Create a cyber hygiene policy. Creating a common set of practices to maintain cyber hygiene
will make it easier to maintain hardware and software.
Document all equipment, hardware and software. Create a list of hardware, software and
web applications used. Manage any newer installs, so they are kept track of and updated when
needed.
Inspect the list to find unused or outdated software and hardware that could have
vulnerabilities. Uninstall outdated and unused hardware and software.
Physically segment computer networks.