0% found this document useful (0 votes)
39 views14 pages

Browser Security and Tracking Prevention

The document discusses reducing the browser attack surface through steps like assuming zero trust, creating strong access protocols, using strong authentication, protecting backups, and segmenting networks. It also talks about browser isolation, compartmentalization using different browsers for different tasks, security features of Firefox like malware detection, and privacy extensions like uBlock Origin and uMatrix.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views14 pages

Browser Security and Tracking Prevention

The document discusses reducing the browser attack surface through steps like assuming zero trust, creating strong access protocols, using strong authentication, protecting backups, and segmenting networks. It also talks about browser isolation, compartmentalization using different browsers for different tasks, security features of Firefox like malware detection, and privacy extensions like uBlock Origin and uMatrix.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Browser Security and Trackin

Prevention
Reducing the
Browser Attack
Surface
Attack Surface

• An attack surface is the total sum of


vulnerabilities that can be exploited to carry
out a security attack. 
Reduce Attack Surface in 5 Steps 
1. Assume zero trust. No user should have access to your
resources until they've proven their identity and the security of
their device. It's easier to loosen these requirements and allow
people to see everything, but a mindset that puts security first will
keep your company safer.
2. Create strong user access protocols. In an average company,
people move in and out of influence with alarming speed. Each
person needs access to your network to do good work, but those
rights should be removed as soon as the person is no longer part of
your organization. Pair with Human Resources to solidify password
policies.
• Use strong authentication policies. Consider layering strong
authentication atop your access protocols. Use attribute-based
access control or role-based access access control to ensure data can
be accessed by the right people.
• Protect your backups. Replicas of code and data are a common part
of a typical company's attack surface. Use strict protection protocols
to keep these backups safe from those who might harm you.
• Segment your network. The more firewalls you build, the harder it
will be for hackers to get into the core of your business with speed.
Do it right, and you can 
drive security controls down to just a single machine or user.
Browser Isolation and Compartmentalization
• Browser isolation is a process to physically isolate a user’s browsing activity
away from local networks and infrastructure, isolating malware and
browser-based cyber attacks in the process while still granting full access
• When you compartmentalize your web browsers, you simply make use of
different browsers for different online activities. It is a way of splitting your
internet activities into various browsers, which makes it difficult for them to
be tracked.
• Take, for example, the essential things you do on the internet include
emailing, online banking, and social media. By compartmentalizing your
browsers, you use one browser for email, a different one for online banking,
and a different one for your social media.
Firefox Security, Privacy and Tracking
• Firefox has a number of security features, including malware
detection and security indicators. Firefox provides an incredibly
secure browsing experience thanks to its sophisticated security
features. Firefox also gives you control over what information
you share online, allowing you to keep your personal data
private. In private mode, Firefox is one of the few browsers that
blocks third-party trackers by default. A browser extension that
makes it more difficult to track you while you're on the web.
uBlock Origin

• uBlock Origin is a free and open-source, cross-platform


browser extension for content-filtering, including ad-
blocking. Development started by forking from
the codebase  of HTTP switchboard along with another
blocking extension called uMatrix.
uMatrix

•uMatrix is an open-source browser extension for


Chrome and Firefox that allows you to control a large
part of your internet browsing experience. uMatrix and
uBlock Origin almost the same.
• Browsers have revolutionized the way we live our lives –
enabling us to read the news, enjoy entertainment, carry
out research, book our holidays, buy and sell, shop,
network, learn, bank and carry out many other everyday
tasks. 
• However, there are several risks associated with going
online. These result from either visiting malicious
websites or inadvertent disclosure of personal
information. 
The risks of visiting malicious, criminal or
inappropriate websites include:
• Viruses and spyware (collectively known as malware).
• Phishing , designed to obtain your personal and/or financial information and
possibly steal your identity.
• Fraud, from fake shopping, banking, charity, dating, social networking,
gaming, gambling and other websites.
• Copyright infringement – copying or downloading copyright protected
software, videos, music, photos or documents.
• Exposure to unexpected inappropriate content.
Front-Door Viruses

• All front-door attacks require the actions of the user to


allow the virus to infect the system. Therefore, they are
referred to as a front-door attack, as metaphorically, the
user is tricked into opening the front door and letting the
virus in. The most common ways in which this style of
attack is disguised are emails, web browsing or
downloads. 
Back-Door Viruses

• A back-door virus is any form of program that grants


unauthorized access to an entire system via a software or
network vulnerability. These attacks differ from front-
door as they do not require any action by the user of the
system and still hold the ability to infect.

You might also like