Browsing

February 9, 2018

Browsing

Navigation:
< Back

Cyber-Risk-Vulnerability-Nth-Third-Party-TPRM-Contingent-Regulatory-Concentration-technology-assessment-analysis-insurance-best-practices-compliance-Flaw Hypothesis Methodology What is Browsing?

In cybersecurity, “Browsing” refers to the activity of navigating the internet using a web browser, and it’s a critical area for security because browsers are vulnerable to threats like malware, phishing, and data breaches. Secure web browsing involves employing tools, techniques, and settings to protect against these risks, ensuring user data, privacy, and online transactions are safe. 

Why is Browsing a Security Risk?

  • Browser Vulnerabilities: Web browsers are constantly targeted by attackers to spread malware or gain access to systems. 
  • Malicious Websites: Websites can use malicious code, exploit browser functions, or disguise themselves as trusted entities to attack users. 
  • Data Collection: Browsers and websites collect user data, such as browsing history, location, and microphone/camera access, which can be exposed in a data breach. 
  • Phishing Attacks: Attackers use deceptive websites to trick users into revealing sensitive information. 

How to Browse Securely

  • Use a Secure Browser: Utilize major browsers like Chrome, Firefox, Safari, or Edge and ensure they are updated. 
  • Keep Software Updated: Regularly update your browser and plugins to patch security vulnerabilities. 
  • Configure Security Settings: Adjust your browser’s security settings to a higher level, block third-party cookies, and be cautious about granting site permissions for location, camera, or microphone access. 
  • Use HTTPS: Look for the padlock icon and “https://” in the URL to ensure your connection is encrypted and secure for sensitive transactions. 
  • Employ Security Tools: Install reputable anti-malware software and privacy-focused browser extensions like ad blockers and script blockers (e.g., uBlock Origin, Privacy Badger). 
  • Be Wary of Warnings: Pay attention to browser warnings about dangerous websites and avoid them. 
  • Use Privacy-Focused Search Engines: Consider search engines which don’t track your searches. 
  • Practice Safe Habits: Avoid downloading software from unknown sources and be cautious of pop-up windows, which can be used for malicious purposes. 
  • Consider Browser Isolation: For enterprise use, browser isolation technologies load and execute web content in a remote cloud environment, separating the risky browsing activity from local devices, according to Cloudflare

Legacy Definition

Act of searching through information system storage or active content to locate or acquire information. This may be done without necessarily knowing the existence or format of information being sought.
SOURCE: CNSSI-4009