1/49
Flashcards about safe web browsing
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
When using a computer and web browser, you must consider the ways to keep transmitted information secure and prevent __ from infecting your computer.
malicious software (malware)
Data transferred over a free network could be intercepted by anyone else connected to the network and by __.
the person that owns the network
To mitigate the interception of data, use a __ that encrypts the link between your client and the web or mail server.
security-enabled protocol (SSL/TLS)
Unencrypted Internet traffic processed over an Internet connection may be stored on __.
the ISP's computers
When using a public workstation, always be alert to the possibility that it could be infected with __.
malware
When using a public workstation, clear the __ before shutting down or logging off.
browser cache
When using a public workstation, make sure you do not allow __ to be cached.
passwords
If you operate a wireless network, it is important to __ it so that others do not make malicious use of it.
secure
It is also illegal to use open networks without explicit __ from the owner.
permission
If you try to guess or crack the password of someone's network, you are committing an __.
illegal act
The web browser is one of the most well-exploited vectors for infecting a system with __ or stealing information.
malware
__ is malicious software designed to infiltrate or damage computer systems.
malware
Viruses and worms are malware principally designed to __ to other PCs.
spread
__ is an apparently legitimate application that conceals malicious functions, such as spyware or a bot allowing remote control of the PC.
Trojan Horse
__ is software or configuration files installed with your agreement that helps a company track what pages you visit and display personalized adverts to you.
Adware
__ is malware installed covertly, possibly as a Trojan or as a result of a virus or worm infection, that tries to track everything you use the computer for.
Spyware
Legacy browsers are more likely to be __ to malware.
susceptible
Ensure that the browser software and any __ software used by the browser is updated with the latest security patches.
plug-in
Obvious symptoms of infection by spyware or adware are pop-ups or additional toolbars, the home page or search provider changing suddenly, searches returning results that are different from other computers, __.
slow performance, and excessive crashing (faults)
__ is where the user tries to open one page but gets sent to another, and may imitate the target page.
Redirection
In adware, redirection is just a blunt means of driving traffic through a site, but spyware may exploit it to capture __.
authentication details
Adverts for free anti-virus, or virus infection warnings, or system performance warnings are all likely to be __.
bogus
You can only mitigate the type of threat where malware infects your computer because OS or browser software is not up to date by installing the latest __.
software patches
You can only mitigate the threat of malware infecting your computer because OS or browser software is not up to date by installing the latest software __.
patches
Many websites and web applications used custom or proprietary features of IE that meant other browsers might fail to run the __ properly.
web application
Compatibility aside, your choice of browser is largely down to __.
personal preference
Do make sure you choose a browser whose developer is active in monitoring __ and providing software updates to fix them.
security issues
Scripting is usually based on __.
JavaScript
Animated or interactive content often uses a browser __.
add-on
Flash and Silverlight are two rival development environments used to provide __ and video.
interactive web applications
Java applications require the __ to be installed on Windows and for the Java plug- in to be enabled in the browser.
Java Virtual Machine
When a web page needs to use active content and it is either not permitted to by current security settings or because the required plug-in is not installed, the browser displays a __.
warning
Generally speaking, you should only install add-ons where the browser can identify that the publisher is a __.
trusted source
Most modern sites use __ for interactive content.
scripting
Most sites will use __ scripting, meaning that code runs on the server to display the page you are looking at.
server-side
Deactivating client-side scripting tends to __ most of the websites published on the Internet.
break
Modern browsers __ the scripts running on a page or browser tab so that they cannot change anything on other tabs or on the computer.
"sandbox"
While scripting is usually left enabled, all browsers provide tools for managing __.
add-ons
__ can add functionality to the browser and might install a toolbar or change menu options.
Extensions
__ are designed to play some sort of content embedded in a web page, such as Flash, Silverlight, or other video/multimedia format.
Plug-ins
You can view installed add-ons and choose to remove or enable/disable them using the browser __ button or menu.
settings
All extensions and plug-ins should be __ signed by the developer to indicate that the code is as-published.
digitally
You should be extremely wary of installing __ add-ons.
unsigned
A __ is a plain text file created by a website when you visit it used to store session information.
cookie
An __ can often be tied quite closely to a geographic location
IP address
First-party cookies are set by __.
the domain you visit
Third-party cookies are set by __.
another domain
__ might make use of cookies to track what sites you visit and display targeted adverts.
Spyware and adware
Confidential information, such as a password, should only be stored in a __ cookie.
secure
A __ is a 'sub-window' that appears over the main window, and can be implemented using scripts or add-ons.
pop-up