0% found this document useful (0 votes)
28 views2 pages

Activity 1.2.4 Securing Your Browser

Uploaded by

italyrox21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views2 pages

Activity 1.2.4 Securing Your Browser

Uploaded by

italyrox21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Activity 1.2.

4 Securing Your Browser

Vocabulary
1. URL-The acronym for “Uniform Resource Locator”. The systematic way to find
specific web addresses and web pages. A URL is composed of characters that
contain information about where to locate a resource over the internet.
2. Browser Extension-piece of software that adds a custom function to the core browser

Questions
9. Many websites use HTTPS by default to provide privacy and security for their users. What are
some sites that should always use HTTPS?
d. E-commerce Sites, Banking Services, Social Media Platforms, Email Providers, Healthcare
Portals, Government Websites, Education Platforms, File Storage Services
28. When using a Chrome incognito browser, record what information is hidden and what
information is not.
Not saved or visible Saved and/or Visible

Browsing history Websites you visit


Cookies and site data Employer/school
Info entered in forms Internet service provider
37. By manipulating the date of the security lab, you have created a “contrived” scenario to test a
security feature. From a security standpoint, describe what it means to discover an invalid site
certificate on an actual website.
d. It raises suspicions about the site's legitimacy, potentially indicating phishing, Data may
not be properly encrypted, increasing the risk of interception. Businesses may face legal
ramifications for non-compliance with data protection regulations.
41. Select Downloads from the Customize and control Google Chrome menu and then select Show in
folder. Record the location of the downloaded files.
d.
43. In the Browse for Folder window, select Desktop and click OK. You have just specified a new
location to store downloaded files. Record this new location as shown in Chrome Settings.
d.

Conclusion Questions
1. What should you do if your entire family shares your computer and you install a plugin that saves
usernames and passwords on the computer?
Create Separate User Accounts to keep information private; Clear Browser Data Regularly to minimize
exposure; Use Incognito Mode for sensitive logins.

2. How does weak browser security represent the weakest link in a network?
Browsers are common targets for attacks.
Users can fall for phishing scams.
Shared environments increase risk if one account is compromised.

You might also like