assignment
How are Internet browsers protecting your security – provide 4 examples with a two-sentence supporting explanation for each of the examples?
-
- Provide two examples with two-sentences about how these protections are circumvented/thwarted
- Review two Gmail-plugins (or your email provider) available to help manage phishing and inbox overload. Provide the plug-in name, URL, and a two-sentence description
- Compare and contrast the browsers “tor browser”, “brave”, and “Chrome, Firefox, or Safari” from an Internet Security perspective.
- Create the three-column table. Fill in five additional security – replace Example A-E. I have provided an example of a security feature (JavaScript Blocker) for each browser.
-
Security Features Tor Brave Chrome, Firefox, or Safari Example A Example B Example C Example D Example E JavaScriptBlocker Yes Default setting – scripts blocked Plug-in required – Example – ScriptBlock
-
- Create the three-column table. Fill in five additional security – replace Example A-E. I have provided an example of a security feature (JavaScript Blocker) for each browser.
- How many cookies are on your computer and provide the contents of a single cookie?
- https://www.thewindowsclub.com/cookies-folder-location-windows (Windows)
- https://www.intego.com/mac-security-blog/how-to-manage-and-remove-browser-cookies-on-mac-and-ios/ (Apple)
- Google Chrome on a Mac -> https://apple.stackexchange.com/questions/232433/where-are-google-chrome-cookies-stored-on-a-mac
- http://www.whatarecookies.com/view.asp (Various Browsers)
- Review the advanced settings in your browser.
- Identify and describe two advanced settings that you were not aware of that were configurable in your browser. Provide a brief tutorial on how to access the settings and what are the positives/negatives of enabling/disabling the setting.
- Explore one of the free online cybersecurity learning resources provided by NIST’s National Initiative for Cybersecurity Education (NICE) : https://www.nist.gov/itl/applied-cybersecurity/nic…
- Select one of the materials from the Career and Professional Development Section
- Provide a five-sentence summary of the resources.
- Who’s the provider?
- What are the strengths/weaknesses?
- What can you learn from the materials? (Be specific – what’s the niche? cybersecurity is too broad of a response)
- Explore the specific resource and select a specific training
- What training did you select? Why?
- What chapter of the textbook aligns with the specific training?
- What did you learn from the specific training?
- Additionally, provide a two-sentence summary of the content?
- Write five questions (and provide the answers) to assure and assess the participant’s reading and understanding of content.