logo

ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES

   

Added on  2022-09-01

9 Pages1795 Words21 Views
Running head: ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
Name of student
Name of university
Author’s note:

ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES1
Abstract
In order to retrieve personal information, hackers often tricks people to visit a website where
they find a URL in address bar of that website similar to a website that they recognize. This is
referred to as website spoofing and if personal information is asked from visitor of that
website, then it is referred to as phishing scam and therefore website spoofing is an important
cyber-security issue. In this report some important security issues regarding access to web
browsing and internet has been analysed and strategies for mitigating those issues are also
analysed in details.

ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES2
Table of Contents
Introduction................................................................................................................................3
Procedure to minimize users clicking on links without considering the risks of their actions. .3
Procedure to address Web page addresses that are disguised....................................................4
Procedure to ensure that third-party software has a mechanism for receiving security updates5
Procedure to ensure users know how to configure their web browsers securely.......................6
Conclusion..................................................................................................................................6
References:.................................................................................................................................8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Defense in Web-Based Attacks | Study
|6
|1596
|13

What is Cybersecurity? Everything You Need to Know
|6
|1447
|17

GNS3 Simulation - Networking
|9
|565
|52

Social Engineering Attacks: Phishing Attacks
|11
|653
|328

Cryptojackers and miners PDF
|20
|6739
|86

ANALYSIS OF VULNERABILITY FROM PHISHING EMAIL.
|3
|401
|77