country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Three Reasons Browsers Difficult To Secure

tag 0 Download7 Pages / 1,683 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss About The Three Reasons Browsers Difficult To Secure?

 

Answer:

Introduction

Today everyone knows about the web browser and its usage. To use web browser no need to do so much by a user. After installing web browser through its executable file, an icon appears on the screen and by clicking on that icon browser will open and user can use that accordingly. While using web browsers, a user has to face some security related issues that are critical enough to control. In next segment of report, I will discuss main challenges, problems, appropriate technologies to resolve issues and unclear areas of web browser attacks.

Discussion

The very popular web browsers are Mozilla Firefox, Internet Explorer, Google Chrome, Opera and Safari. These all browsers have to encounter problem of web attacks and these attacks are conducted by using social engineering, cross-site scripting and client-side exploits. Due to these attacks of web browsers, following challenges have to face by users.

 

Challenges of Web Browser Attacks

According to analysis, it is found that near about 45% of people those are surfing internet are not using most secure version of web browser and facing following challenges.

  1. The first challenge is of security patches applied to web browsers. If a web browser is not equipped with appropriate security patches than web browsers can result in vulnerable attacks. Moreover, security patches cannot work without proper patching of browser plug-ins (Zeltser.com, 2017).
  2. Another challenging factor is poor coding of web applications and vulnerabilities that are found in software solutions connected with web browsers. These weak factors of web browsers are necessary to overcome at developers’ end because hackers are taking advantage from these weak factors.

Therefore, these above discussed challenges of web browsers attacks are required to control by developers by using advanced techniques at priority basis. Otherwise, issues of data lost and virus attacks will be increased.

Problems of Web Browsers Attacks

Due to above challenging factors of web browser attacks, various problems have raised for people who use web browsers that are listed as below:

  1. The first problem is that due to lack of security on web browsers, hackers can easily hack them and can access information about saved login, cookies, cache and visited websites.
  2. Another problem is of addition of harmful programming scripts into browsers by hackers. These scripts are vulnerable enough and redirect the users automatically to unknown websites without any knowledge of users (Shema, 2012). Those websites may have some malicious programs that can enter into computer’s system of user and can cause damage.
  3. Another problem is related to alteration of web browsers by malicious attacks from hackers’ side. These alternations lead to weird activities of web browsers that users are unable to understand (Lifewire, 2017).
 

Relevant Technologies

Web browsers can be protected from vulnerabilities by using appropriate technologies. Following are some relevant technologies that can be used to manage web browser attacks:

  1. The configuration of web browser should be done properly. While configuring browser, it is necessary to follow-up every instruction and security patches and plug-ins should also be installed properly. These plug-ins are helpful to protect web browsers from unknown entities (Us-cert.gov, 2017)
  2. Another relevant technology is to update browser regularly and also install third party solutions like ad-blocker to restrict harmful online advertisements to enter into the system. The advertisements so much injurious for system that these can slow down the system and can corrupt its boot files. Ad blockers are useful enough to stop these types of advertisements and other unknown entities.
  3. Web browsers have security and privacy options and with the help of these options web browsers can become more secure. For example, by hiding saved login passwords, by clearing caches and cookies that are not required at regular basis and by clicking checkbox options those are related to privacy of web browser content and its display.

Application of Relevant Technologies

The application area of these technologies is wide enough and these can be used to protect different versions of web browsers. Most of the web browser developers are using these relevant technologies to protect their browsers from unknown vulnerabilities (Howtogeek.com, 2017).

Unclear Areas of Web Browser Attacks

Web browser attacks are common among people but there are some vague areas about which people must have knowledge. The first thing that is not yet cleared about web browser attacks is that why programming languages are not so strong to restrict vulnerable browser attacks. At developers’ end this thing must be cleared that how programming languages can be more protective and strong to stop hackers to mischief web browser. Moreover, an appropriate solution for protect web browsers from hackers is also not properly found yet (Thorpe, 2017).

Research Questions

While analyzing problem of web browser attacks, some common research questions are found that are required to discuss here in this report.

Question 1: What is the best way to get prevention from Web Browser Attacks?

Answer: The most appropriate way to get prevention from web browser attacks is its periodical updates. Regular updates provides strength to browser to cope up with vulnerable objects (Computing & Browser, 2017).

Question 2: What is the main reason of Web Browser Attack?

Answer: The entrance of any third party application or any other entity into web browser without knowledge but with permission of users, is the main reason of web browser attacks (Its.ucsc.edu, 2017).

 

Described Issues in the Forum

To know about the main issues of Web browser attacks I have selected a forum and according to that forum the main issues of web browser attacks are violation of security of users’ information such as cookies and login information, entrance of virus into system through web browser and slow performance of web browser as well as computer system. These issues put bad impact on users’ activities that they perform by using web browsers. This available information in forum is accurate and users of web browsers must have knowledge about these issues and must use appropriate security techniques to resolve these problems (SearchMidmarketSecurity, 2017).

Issue that is addressed the in Forum  

All the mentioned issues in selected forum about web browser attacks are relevant. But another issue that is not addressed in this forum is that downloading content from different websites by using web browsers can also be harmful for users if it will not be scanned properly before downloading into system (Adams, 2017). This content may have some attached virus entities that enters into web browser easily and also try to corrupt the main files of browser. Due to this, browser does not work properly and also becomes slower than its normal speed. This issue is important to discuss here because nowadays, downloading rate of movies, audio and other content have become so higher and people do not care while downloading content and click on links that are harmful (Happyhamstercomputers.com, 2017).

Impact of Issues of Real World

The above discussed issues and challenges of web browser attacks have bad impacts on users of web browsers. This is because due to these attacks their computer systems, its content and web browser related information are at high risk. From the first day after installation, it has become essential for them to protect their web browsers by using secure software solutions that are especially made to get prevention from web browser attacks. If these software solutions will not be used then overall problem of web browser attacks can get worse. At developers’ end, due to improper management of security and privacy of web browsers, hackers are trying to get into browsers to violate them (Searchsecurity.techtarget.com, 2017).

Most important Lesson Learnt from Discussions

First of all I got to know that security and privacy of web browser is mandatory to maintain at users and as well as developers’ end. Moreover, users must not allow any unknown entity to enter into system through browser and to do this, appropriate third party software solutions should be used. On other side, while developing web browsers, developers must use secure programming languages and all security patches and plugins should be configured properly (Google, 2017).

 

Conclusion

In conclusion, it is right to say that without web browsers it is difficult to access data from different websites and to explore other internet sources. But security should be maintained at priority basis and everyone should have knowledge about possible challenges and risk factors of using web browsers and how these can be overcome by using security tools.

 

References

Securing Your Web Browser. (2017). Us-cert.gov. Retrieved 28 September 2017, from https://www.us-cert.gov/publications/securing-your-web-browser

How to avoid attacks that exploit a Web browser vulnerability. (2017). SearchMidmarketSecurity. Retrieved 28 September 2017, from https://searchmidmarketsecurity.techtarget.com/tip/How-to-avoid-attacks-that-exploit-a-Web-browser-vulnerability

Three Web Attack Vectors Using the Browser. (2017). Zeltser.com. Retrieved 28 September 2017, from https://zeltser.com/web-browser-attack-vectors/ 

Computing, H., & Browser, W. (2017). What is a Web Browser?. WhatIsMyIPAddress.com. Retrieved 28 September 2017, from https://whatismyipaddress.com/web-browser

Thorpe, E. (2017). Three reasons why browsers are so difficult to secure. IT PRO. Retrieved 28 September 2017, from https://www.itpro.co.uk/security/29077/three-reasons-why-browsers-are-so-difficult-to-secure

Do You Know What a Web Browser Actually Is?. (2017). Lifewire. Retrieved 28 September 2017, from https://www.lifewire.com/what-is-a-browser-446234

7 Ways to Secure Your Web Browser Against Attacks. (2017). Howtogeek.com. Retrieved 28 September 2017, from https://www.howtogeek.com/228828/7-ways-to-secure-your-web-browser-against-attacks/

Web browser security news, help and research - SearchSecurity. (2017). Searchsecurity.techtarget.com. Retrieved 28 September 2017, from https://searchsecurity.techtarget.com/resources/Web-Browser-Security

Google, i. (2017). 20 Things I Learned About Browsers and the Web. 20thingsilearned.com. Retrieved 28 September 2017, from https://www.20thingsilearned.com/en-GB/all/print

Shema, M. (2012). Hacking web apps. Amsterdam [u.a.]: Elsevier/Syngress.

Web Browser Secure Settings. (2017). Its.ucsc.edu. Retrieved 28 September 2017, from https://its.ucsc.edu/software/release/browser-secure.html  

Adams, D. (2017). 11 steps to reduce the risk of web attacks - Patriot Technologies, Inc.. Patriot Technologies, Inc.. Retrieved 28 September 2017, from https://patriot-tech.com/blog/2011/02/04/11-steps-to-reduce-the-risk-of-web-attacks/

Understanding Web Browser Attacks | Get Certified Get Ahead. (2017). Get Certified Get Ahead. Retrieved 28 September 2017, from https://blogs.getcertifiedgetahead.com/understanding-web-browser-attacks/

The 2 Main Types of Web Browser Attacks | Happy Hamster Computers. (2017). Happyhamstercomputers.com. Retrieved 28 September 2017, from https://happyhamstercomputers.com/computer-repair-tips/the-2-main-types-of-web-browser-atta

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Three Reasons Browsers Difficult To Secure. Retrieved from https://myassignmenthelp.com/free-samples/three-reasons-browsers-difficult-to-secure.

"Three Reasons Browsers Difficult To Secure." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/three-reasons-browsers-difficult-to-secure.

My Assignment Help (2018) Three Reasons Browsers Difficult To Secure [Online]. Available from: https://myassignmenthelp.com/free-samples/three-reasons-browsers-difficult-to-secure
[Accessed 03 June 2020].

My Assignment Help. 'Three Reasons Browsers Difficult To Secure' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/three-reasons-browsers-difficult-to-secure> accessed 03 June 2020.

My Assignment Help. Three Reasons Browsers Difficult To Secure [Internet]. My Assignment Help. 2018 [cited 03 June 2020]. Available from: https://myassignmenthelp.com/free-samples/three-reasons-browsers-difficult-to-secure.


MyAssignmenthelp.com is the only dissertation writing help provider in Australia that offers the combination of quality and affordability. Students can take expert advice in selecting suitable dissertation writing topics, structuring dissertation ideas, gathering relevant research material, revising the written paper or even dissertation methodology help. As a result, they don't need to search 'who can do my dissertation', they can straight come to us. They can easily pay our expert for their assignment instead typing 'who can write my dissertation' on search engines.

Latest Management Samples

CO4830 IT Project Management 3

Download : 0 | Pages : 8
  • Course Code: CO4830
  • University: University Of Central Lancashire
  • Country: United Kingdom

Answer: Introduction The Lizzie Leather Company has been expanding the business through establishing six different centers at the different places. It is a crucial aspect for the successful implementation of this expansion is to manage an effective and efficient communication between all the centers. The aim of this report is to emphasize on the project management approach that could be an effective approach for the accomplishment of the obje...

Read More arrow

MGT 6093 Entrepreneurship Practice And Processes For Health Promotion Unit

Download : 0 | Pages : 28
  • Course Code: MGT 6093
  • University: Segi University
  • Country: Malaysia

Answer: Product Description:  While there is lunch program available in all the government school several students do not makes the use of food provided to them. The school food menu is restricted to sandwiches which includes meat products. Additionally, it is noticed that most the students turn to vendor that come to school premises to provide fried food. These vendors provide school students with the fried food, soda and candy though c...

Read More arrow

SBLC4001 Management Information Technology For PureGym Limited

Download : 0 | Pages : 11
  • Course Code: SBLC4001
  • University: University Of Wales Trinity Saint David
  • Country: United Kingdom

Answer: Introduction:   The report is a discussion on management information technology with special focus on how social media provides a platform to various businesses for communicating and delivering information to the social media. The company chosen here is PureGym Limited that represents a chain of no frill clubs meant especially for fitness in the United Kingdom (PureGym 2018). These chains of fitness club have its base point in...

Read More arrow

MKT220 Business Research Methodology For Educational Recordings

Download : 0 | Pages : 5
  • Course Code: MKT220
  • University: Charles Sturt University
  • Country: Australia

Answer: 1. Interviewee: “The use of smart speakers is highly favourable in my house and each and every member in the house uses it for various reasons [8 second pause]. There is no particular purpose for using the voice-activated speaker in my voice, as we use it as per our requirement [6 second pause]. For instance, I use the voice-activated speaker for listening to music, as listening to music after hectic days calms me down. Oh, Yes! ...

Read More arrow

LD0474 Strategic Management For Competitive Advantage

Download : 0 | Pages : 9

Answer: Introduction  The main purpose of this assignment is to analyze the policies of Corporate Social Responsibility of a company. Corporate Social Responsibility (CSR) can be defined as the various policies which are followed by the business in order to ensure that the activities of the business do not affect the environment or the social well-being of the society (Schwartz, 2017). In other words, CSR policies requires the compa...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,328,472

Orders

4.9/5

Overall Rating

5,076

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1896 Order Completed

95% Response Time

Herman Berens

MSc in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

440 Order Completed

99% Response Time

Jack Arens

MBA in HRM

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Receive good grades for the said subject even receive my work in the quickest possible time, although there were spelling mistakes, it was overall a good work.

flag

User Id: 421441 - 03 Jun 2020

Australia

student rating student rating student rating student rating student rating

Work well done. I am very happy with the information received and the level of service is top class.

flag

User Id: 385702 - 03 Jun 2020

Australia

student rating student rating student rating student rating student rating

Great work is done by experts. All the requirements are done whatever, I asked for> I again appreciate the whole team. I would rate 5 stars to them. thanks

flag

User Id: 279240 - 03 Jun 2020

Australia

student rating student rating student rating student rating student rating

It was good, but could be better if the pictures weren't used for case studies. Also the plaigarism was low.

flag

User Id: 58382 - 03 Jun 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?