Always use trusted sources Avoid untrusted third-party sites Avoid untrusted third-party sites  - Browser download and installation, Install a hash checking application Available for command line and GUI Hash values may be available on the download site - Hash verification, Official browser extension library Chrome Web Store Known-good websites - Trusted sources, Random or unfamiliar websites Installed by malware This is a significant attack vector - Untrusted sources, All passwords in one location A database of credentials Secure storage Create unique passwords   - Password managers, Security alerts and invalid certificates Look at the certificate details May be expired or the wrong domain name - Secure connections, Pop-up blocker Prevent unwanted notification windows Enable or disable Block and allow  - Enable pop-up blockers, Clear browsing data Saved passwords Clear cache   - Clearing private data, Don’t store information from a browsing session Good for privacy   - Private browsing mode, Share browsing data across multiple systems Use with other computers, tablets, and mobile devices  - Browser data synchronization, Some browsers can block advertising This isn’t always an option Many sites will track visits Difficult to always recognize an advertisement - Ad blockers,

a+1102 2.10 - Browser Security (continued)

Lestvica vodilnih

Vizualni slog

Možnosti

Preklopi predlogo

Obnovi samodejno shranjeno: ?