The document discusses reducing the browser attack surface through steps like assuming zero trust, creating strong access protocols, using strong authentication, protecting backups, and segmenting networks. It also talks about browser isolation, compartmentalization using different browsers for different tasks, security features of Firefox like malware detection, and privacy extensions like uBlock Origin and uMatrix.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
39 views14 pages
Browser Security and Tracking Prevention
The document discusses reducing the browser attack surface through steps like assuming zero trust, creating strong access protocols, using strong authentication, protecting backups, and segmenting networks. It also talks about browser isolation, compartmentalization using different browsers for different tasks, security features of Firefox like malware detection, and privacy extensions like uBlock Origin and uMatrix.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14
Browser Security and Trackin
Prevention Reducing the Browser Attack Surface Attack Surface
• An attack surface is the total sum of
vulnerabilities that can be exploited to carry out a security attack. Reduce Attack Surface in 5 Steps 1. Assume zero trust. No user should have access to your resources until they've proven their identity and the security of their device. It's easier to loosen these requirements and allow people to see everything, but a mindset that puts security first will keep your company safer. 2. Create strong user access protocols. In an average company, people move in and out of influence with alarming speed. Each person needs access to your network to do good work, but those rights should be removed as soon as the person is no longer part of your organization. Pair with Human Resources to solidify password policies. • Use strong authentication policies. Consider layering strong authentication atop your access protocols. Use attribute-based access control or role-based access access control to ensure data can be accessed by the right people. • Protect your backups. Replicas of code and data are a common part of a typical company's attack surface. Use strict protection protocols to keep these backups safe from those who might harm you. • Segment your network. The more firewalls you build, the harder it will be for hackers to get into the core of your business with speed. Do it right, and you can drive security controls down to just a single machine or user. Browser Isolation and Compartmentalization • Browser isolation is a process to physically isolate a user’s browsing activity away from local networks and infrastructure, isolating malware and browser-based cyber attacks in the process while still granting full access • When you compartmentalize your web browsers, you simply make use of different browsers for different online activities. It is a way of splitting your internet activities into various browsers, which makes it difficult for them to be tracked. • Take, for example, the essential things you do on the internet include emailing, online banking, and social media. By compartmentalizing your browsers, you use one browser for email, a different one for online banking, and a different one for your social media. Firefox Security, Privacy and Tracking • Firefox has a number of security features, including malware detection and security indicators. Firefox provides an incredibly secure browsing experience thanks to its sophisticated security features. Firefox also gives you control over what information you share online, allowing you to keep your personal data private. In private mode, Firefox is one of the few browsers that blocks third-party trackers by default. A browser extension that makes it more difficult to track you while you're on the web. uBlock Origin
• uBlock Origin is a free and open-source, cross-platform
browser extension for content-filtering, including ad- blocking. Development started by forking from the codebase of HTTP switchboard along with another blocking extension called uMatrix. uMatrix
•uMatrix is an open-source browser extension for
Chrome and Firefox that allows you to control a large part of your internet browsing experience. uMatrix and uBlock Origin almost the same. • Browsers have revolutionized the way we live our lives – enabling us to read the news, enjoy entertainment, carry out research, book our holidays, buy and sell, shop, network, learn, bank and carry out many other everyday tasks. • However, there are several risks associated with going online. These result from either visiting malicious websites or inadvertent disclosure of personal information. The risks of visiting malicious, criminal or inappropriate websites include: • Viruses and spyware (collectively known as malware). • Phishing , designed to obtain your personal and/or financial information and possibly steal your identity. • Fraud, from fake shopping, banking, charity, dating, social networking, gaming, gambling and other websites. • Copyright infringement – copying or downloading copyright protected software, videos, music, photos or documents. • Exposure to unexpected inappropriate content. Front-Door Viruses
• All front-door attacks require the actions of the user to
allow the virus to infect the system. Therefore, they are referred to as a front-door attack, as metaphorically, the user is tricked into opening the front door and letting the virus in. The most common ways in which this style of attack is disguised are emails, web browsing or downloads. Back-Door Viruses
• A back-door virus is any form of program that grants
unauthorized access to an entire system via a software or network vulnerability. These attacks differ from front- door as they do not require any action by the user of the system and still hold the ability to infect.
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux