Configure Browser Security Flashcards
Lesson 17B (17 cards)
Google Chrome web store provides an official location for publishing extensions and themes.
Sync settings in a Microsoft Edge browser profile. (
When the browser trusts the certificate issued to www.comptia.org, it displays a lock icon and identifies the URL as HTTPS.
Mozilla Firefox’s trusted certificate store showing the DigiCert root certificates that are trusted
authorities.
Viewing cookies set by visiting comptia.org’s home page in Google’s Chrome browser.
Data-at-rest encryption
protecting data that is stored on a device, like a hard drive or cloud server, by encoding it with a key, ensuring only authorized users with the key can access it.
Encrypting File System (EFS)
is a feature in Microsoft Windows that allows users to encrypt files and folders on their computer.
BitLocker
It protects data by encrypting entire drives, ensuring that if a drive is lost or stolen - Windows Pro, Enterprise, and Education editions.
browsers
Microsoft Edge has replaced Internet Explorer, utilizing the Chromium codebase like Google Chrome, while other mainstream browsers like Firefox, Opera, and Safari remain widely used.
trusted browsers
Ensuring a browser is installed from a trusted source, such as an official app store or reputable vendor, helps prevent security risks, with integrity verification done via code-signing certificates or hash comparisons.
untrusted browsers
Installing browsers from untrusted sources risks exposure to adware, spyware, and redirection attacks, making verification through digital signatures or hash comparisons essential for software integrity.
Browser add-ons
enhance functionality but can pose security risks. Extensions modify features and may run scripts, plug-ins display multimedia content but are now largely obsolete, apps facilitate cloud-based document editing, default search providers can redirect searches, and themes change appearance. Trusted sources should be used, as malicious extensions can bypass security measures.
browser settings
Browsers allow users to configure settings like home pages, tab behavior, and search engine choices via menu buttons or internal URLs (e.g., chrome://settings
, edge://settings
, about:preferences
). Advanced settings can be accessed through URLs like chrome://flags
or about:config
.
sign-in privilages
Signing into a browser enables synchronization of settings, bookmarks, history, autofill entries, and passwords across multiple devices for a seamless browsing experience.
Password managers
help users create and store strong passwords across different services, preventing reuse that could lead to credential compromise. They autofill credentials and sync across devices, though some sites may not fully support them, requiring manual input as a fallback.
Password security
is crucial for workstation protection, with best practices including strong credential management and account policies. Weak passwords expose systems to cyberattacks through dictionary-based guessing or breached databases. Trusted certificates ensure secure authentication, with Windows updating root certificates via Active Directory, while third-party browsers require manual trust configuration for enterprise certificates.
Browser privacy settings
control tracking tools like cookies, fingerprinting, and unwanted content through features such as pop-up blockers, ad blockers, and tracking protection. Clearing cache and browsing data or using private/incognito mode enhances privacy but does not ensure full anonymity, as sites can still track users via IP addresses and fingerprinting techniques.