Join Lisa Bock for an in-depth discussion in this video Modifying browser settings, part of IT Security Foundations: Core Concepts.
- A web browser is the graphical user interface to the Internet. A web browser supports obtaining information in a wide variety of formats from viewing content on a webpage to emailing, watching video, chatting, and playing games. It is the portal to the outside world and steps should be taken to ensure safe browsing. Internet Explorer is installed by default on a Windows operating system, and like most browsers can be configured to provide another layer of security such as deciding if you want to allow cookies, how and when sites can use your location information, and blocking unwanted popups.
Hypertext transfer protocol or HTTP is the protocol used to request and retrieve webpages. It's a stateless protocol in that the server that houses the webpage doesn't keep any information about what a client requested in the past such as items in a shopping cart and browsing activity for generating recommendations or obtaining marketing or advertising information. Cookies used by many major websites are small text files put on end devices to store state information to make browsing easier by preserving information about preferences and sign-in information for cookie creation.
For example, I visit an eCommerce site from my computer for the first time. When the first HTTP request comes to the site, a site creates a cookie that has at least a name-value pair such as unique ID 678. However, in most cases, there is a lot more information in the cookie. Some cookies can be dangerous. Settings will allow you to enable, disable, delete, or block cookies. Browser settings can be done on any browser.
We're going to drop this down to accept all cookies, which is something I wouldn't recommend. If we except all cookies, this is going to save cookies from any website. However, if we totally restrict it and block all cookies, this is going to block all cookies from all websites, and cookies that are already on this computer cannot be read by websites. Well, this is very restrictive and it may alter the way your browsing sessions go because it won't remember anything about you and might make browsing a little more difficult.
Down below, looking at location. Location services lets sites ask for where you are, for example, weather or mapping services. Popup blocker. This limits or blocks popups on sites that you visit. In private browsing, deletes information such as passwords, search history, and page history once you close the tab used so that specific websites do not have access to user browsing patterns. We can see that, if I go back to tools, and I select safety.
Do not track request are set on by default. If I want to turn them off, I would have to go in and manually say turn off. Here we can learn more about do not track.
Note: This course maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals 98-367 certification exam and is recommended test prep viewing.
- Differentiate between risks, threats, and vulnerabilities.
- Explain how to avoid worms and viruses.
- Define cookies, and explain how they preserve user information.
- Describe the WPA2 wireless security method.
- Cite the differences between public and private key encryption.
- Summarize how to use a virtual private network.
- Identify ways to minimize the attack surface.