logo

Cyber Defense in Web Based Attacks Report 2022

Describe IE's security flaws, why hackers can steal Windows users data, and ways to keep data safe while using IE.

4 Pages728 Words16 Views
   

Added on  2022-08-26

Cyber Defense in Web Based Attacks Report 2022

Describe IE's security flaws, why hackers can steal Windows users data, and ways to keep data safe while using IE.

   Added on 2022-08-26

ShareRelated Documents
INFORMATION SECURITY 0
Cyber Defense in Web
Based Attacks
Cyber Defense in Web Based Attacks Report 2022_1
INFORMATION SECURITY 1
Module 10: hacking Internet Explorer
Internet explorer security
Internet Explorer is a series of graphical web browsers developed by
Microsoft and the most commonly utilized web browser. Security flaws
occurred in the internet explorer helps the hackers to perform cyber-crimes
and gather sensitive data. There are various security flaws that occur in the
case of internet explorer that negatively impact on the security of web
browsers including exec code overflow, bypass, unauthorized access, CVE-
2020-0674 and many more. Singh, Jeong, & Park, (2016) reported that exec
code overflow is a common vulnerability that exists in the computing
devices when internet explorer improperly accesses objects in the memory
systems.
A security flaw like bypass occurs when internet explorer is not able
to validate the effective security zone of requests for particular links or
URLs. Unauthorized access occurs due to a lack of privacy and the presence
of malware signals in the web browsers that helps criminals to perform
hacking activities in an appropriate manner. From a recent study, it is
highlighted that CVE-2020-0674 is a major security flaw that occurs due to
the presence of bugs and traffic signals in the servers (Fernandes, et al.,
2014).
The presence of such flaws or vulnerabilities negatively impacts on
the web servers and produces security-attacks in the systems. Therefore, it
is significant to manage and handle such vulnerabilities from the internet
explorer for protecting data from hackers and reducing the level of cyber-
crimes. It is found that hackers can steal windows users’ data for earning
money and obtaining sensitive information including financial data, address,
and credit or debit card details and so on. In this modern era, many hackers
Cyber Defense in Web Based Attacks Report 2022_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Cyber Defense in Web Based Attacks
|7
|1418
|22

Assignment on Trends in Cybercrime
|13
|3063
|21

CO4515 - Trends in Cybercrime
|10
|2226
|183

Ethical Hacking: OS Vulnerabilities and Penetration Testing
|12
|2002
|39

Cyber-Attack on Newark City Hall Computers and Sony PlayStation Outage Case
|7
|2098
|58

Assignment on Securing Enterprise Infrastructure
|6
|1354
|16