Preview

Browser Security Report

Good Essays
Open Document
Open Document
885 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Browser Security Report
This paper is a report of comparing security feature and focusing on anti-phishing of Mozilla Firefox and Apple Safari. The reason I have chosen these two browser is I am a Mac user and these two are the most common web browsers on Mac and free download from the Internet. This report is based on research on the Internet and my personal experience.

Web Forgery (Phishing) is a way of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. The name “phishing” is come from the real life activity of fishing, the criminals are the fisherman, they puts a bait at the hook, thus, pretending to be a genuine food for fish (web users), but the hook inside it takes the complete fish out of the pool. Phishing attacks are typically come from email messages or instant massagers that attempt the lure recipient into giving their personal information on fake web sites whose look and feel are almost identical to the real one, they might even use the logo, images and details from the real site.

There are several ways to prevent attacker attack from phishing.
Mozilla Firefox’s has a built-in security feature, which enable users to set phishing protection on from the security pane at preferences tab, it works by checking the sites that user browse to against a list a known phishing sites which download on users computer. The list will be updated automatically and regularly. If Firefox detected a phishing site, a warning dialog will appear. Other anti-phish toolbar or add-on can also be installed on Firefox.

Similarly, Safari also offers a built in anti phishing feature. Safari protects users from fraudulent Internet site by stop loading in and warning with heading “Warning: Suspected phishing site” will appear when the site is suspicious. The suspected phishing sites list is stored in a database, which created by Google. User can choose whether they really

You May Also Find These Documents Helpful

  • Good Essays

    BIS 320 Week 4 DQs

    • 385 Words
    • 2 Pages

    DQ4: How might you explain to a friend who is not technically savvy what phishing is and how it can be avoided? What are five tips you would provide to help your friend avoid phishing?…

    • 385 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    M6 Assignment

    • 387 Words
    • 2 Pages

    7-1: The method I would use would be the SmartScreen filter. With IE 8 and SmartScreen filtering it uses the following to prevent phishing:…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3445 Unit 4 Lab

    • 556 Words
    • 2 Pages

    4. If an attacker wishes to place a phishing page on a website, what is a common vulnerability that can be exploited to successfully do this?…

    • 556 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    unit 242

    • 658 Words
    • 3 Pages

    Here you can alter the level of security you want to set for the internet and block websites that you may feel are inappropriate. You need to protect data with a safe password. A password that includes numbers as well as letters will be a lot safer than just a normal word.…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The first website I will describe is the PayPal website. I visit this website a lot (I have been doing a lot of shopping on eBay lately) and have come to love how easy it is to navigate their website. They also seem to have a lot of security built into their website. For instance if a user sits around on one page for too long it will automatically sign them out and they will have to sign back in. I think this is a great security feature, although it can be a little annoying to have to sign back in. This feature is only useful for banks and websites that deal with sensitive information but I feel my website should not feature that but still have some sort of security feature in it. At the current moment I do not know what security features to use with my web page final.…

    • 772 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    mis 535

    • 2196 Words
    • 8 Pages

    Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks.…

    • 2196 Words
    • 8 Pages
    Satisfactory Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    In order to prevent this, websites could set up web application firewalls or encode their data by adding in special characters only they would know of. For example, in order to avoid being hacked on Facebook, a person could change their password to a password that is hard to guess or set up a firewall to avoid being hacked. When creating or changing a password for Facebook, Gmail, Twitter or any other social networking site, it makes sure the password is…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks.…

    • 1177 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Exam Cheat Sheet

    • 1283 Words
    • 6 Pages

    Phishing: Claiming to be a legitimate business in an attempt to trick people into divulging sensitive information by getting them to go to a specified website…

    • 1283 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Defense against web attacks is a key element in a security professional’s skill set. For this assignment, your manager has asked you to review the Aim Higher College’s Web server and application security and to suggest appropriate defenses. For each of the following scenarios, explain what the threat or threats are, what defenses you would recommend, and why.…

    • 1988 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Web-based attacks – the increasing pervasiveness of Web browser applications along with increasingly common, easily exploited Web browser application security vulnerabilities has resulted in the widespread growth of Web-based threats. Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks to gain access to those computers. Instead, they can focus on attacking and compromising websites to mount additional, client-side attacks.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are a number of ways of reducing this risk to children and young people. You may need to talk to and explain to them about people who may not be who they say they are and may not have the best intentions. You could use control systems to put passwords on sites and even block sites from coming up. Restrict the amount of time that your child spends on the internet.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays

Related Topics