Always use trusted sources Avoid untrusted third-party sites Avoid untrusted third-party sites - Browser download and installation, Install a hash checking application Available for command line and GUI Hash values may be available on the download site - Hash verification, Official browser extension library Chrome Web Store Known-good websites - Trusted sources, Random or unfamiliar websites Installed by malware This is a significant attack vector - Untrusted sources, All passwords in one location A database of credentials Secure storage Create unique passwords - Password managers, Security alerts and invalid certificates Look at the certificate details May be expired or the wrong domain name - Secure connections, Pop-up blocker Prevent unwanted notification windows Enable or disable Block and allow - Enable pop-up blockers, Clear browsing data Saved passwords Clear cache - Clearing private data, Don’t store information from a browsing session Good for privacy - Private browsing mode, Share browsing data across multiple systems Use with other computers, tablets, and mobile devices - Browser data synchronization, Some browsers can block advertising This isn’t always an option Many sites will track visits Difficult to always recognize an advertisement - Ad blockers,
0%
a+1102 2.10 - Browser Security (continued)
共用
由
Thedrizzzle86
information technology
編輯內容
嵌入
更多
排行榜
顯示更多
顯示更少
此排行榜當前是私有的。單擊
共用
使其公開。
資源擁有者已禁用此排行榜。
此排行榜被禁用,因為您的選項與資源擁有者不同。
還原選項
匹配遊戲
是一個開放式範本。它不會為排行榜生成分數。
需要登錄
視覺風格
字體
需要訂閱
選項
切換範本
顯示所有
播放活動時將顯示更多格式。
打開結果
複製連結
QR 代碼
刪除
恢復自動保存:
?