logo

Cyber Security, Features and Security Settings of Google Chrome, Malware Prevention, Denial of Service, Hacking Tools and Cryptography Methods

   

Added on  2023-06-11

12 Pages2762 Words352 Views
Running head: CYBER SECURITY
CYBER SECURITY
[Name of the Student]
[Name of the University]
[Author note]
Cyber Security, Features and Security Settings of Google Chrome, Malware Prevention, Denial of Service, Hacking Tools and Cryptography Methods_1
Question 1:
A. Some of the popular Internet scams have been listed below:
Bank loan or credit card scam: This type of scam is very much common and in this
type of scam the users are guaranteed that they would be getting a huge amount of
money which has already been pre-approved by the bank. Though it may seem
unlikely for people to get trapped by this scam, there’s still a big number of people
who lost money by paying the “mandatory” processing fees required by the
scammers.
Lottery scam: This can be considered as another classic internet scam which is a very
old technique of scam. This type of scam also come from the emails where the user is
sent an email saying that they have won a huge amount of money in lottery and for
claiming that price there is a need of paying some small fees.
Hitman scam: this is considered as one of the frequent internet scam which is
associated with sending of threatening email for the purpose of extorting money from
the user. This type of scam generally occurs in various forms which might include the
threatening someone by saying that someone of the family member would be
kidnaped or killed if certain amount of money is not provided.
Make money fast scam: Cyber criminals are associated with making the users accept
the fact that they ca earn money at a faster rate by making use of the internet. In this
type of scam the criminals would be associated with promising the users about jobs
which do not exists and also include plans and methods by which the user can get
rich. This is very much effective approach taken by the criminals as this would be
associated with addressing the basic needs of money and this happens especially in
situations when the users are facing some difficult financial situations.
Cyber Security, Features and Security Settings of Google Chrome, Malware Prevention, Denial of Service, Hacking Tools and Cryptography Methods_2
B. Features and Security Settings of Google Chrome
It is a web browser designed for a Windows operating system. This browser works on windows
XP, Windows Vista, MAC OS and Linux.
The following are the features and security settings of Google chrome web browser
From the setting menu select the Incognito window a new window appears. Pages
you view from this window won’t appear in your web browser history or search
history.They won’t leave any traces like cookies after you close the incognito window
any files you download or bookmarks will be preserved.
Chrome there is a new feature that has an own Task Manager that shows you how
much memory and CPU usage each tab and plug-in is using. You can open it by
clicking Shift-Esc from within Chrome or place the cursor on a window and right
click and select the Task Manager. You can get more details by clicking the “Stats for
nerds” link, which is on the Task Manager, and it will open a page with full details of
memory and CPU usage for each process within the browser. It is used to close a bad
process in one tab and won’t kill your whole browser session.
One of the features of chrome is dynamic tabs. Here you can drag tabs out of the
browser to create new windows, gather multiple tabs into one window or arrange your
tabs. However, you wish and it becomes quick and easy to login into the desired sites
i.e. reopen the closed sites.
The safe browsing feature in the Google Chrome displays a warning if the web
address listed in the certificate doesn't match the address of the website .The
following are the steps for safe browsing setting in Google Chrome.
Cyber Security, Features and Security Settings of Google Chrome, Malware Prevention, Denial of Service, Hacking Tools and Cryptography Methods_3
From the settings tab select the options and select under the hood under privacy
enable the option show suggestions for navigation error.
Enable the option use a suggestion service to help complete searches and URLS typed
in the address bar.
Enable DNS pre-fetching to improve page load performance.
Enable the phishing and malware protection.
Under minor tweaks enable the never save passwords.
Under computer wide SSL settings enable the option use SSL 2.0.
From the page menu select the create application shortcuts, this is used if you want
some websites to be viewed regularly, and you may want to create application
shortcuts for the desired websites that can be placed on your desktop, Start menu or
quick launch menu so you can choose any one of these options .After creating, if you
double-click on the shortcut icon on the desktop or start menu, the websites open in a
special window that don’t display tabs, buttons, address bar or menus.
Many of the browser functions are available instead in the drop-down menu that
appears when you click the page logo in the upper-right corner of the window. If you
click a link that takes you to a different website, the link opens in a standard Google
Chrome window so you won't lose track of your website.
Question 2:
A. A. The different kind of virus, malware and spyware mainly includes the following along
with the ways how they can be prevented:
Cyber Security, Features and Security Settings of Google Chrome, Malware Prevention, Denial of Service, Hacking Tools and Cryptography Methods_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security: Scams, Browser Security, Malware Prevention, DoS Attacks, Hacking Tools and Cryptography Methods
|12
|2636
|382

Cyber Defense in Web-Based Attacks | Study
|6
|1596
|13

ANALYSIS OF INFORMATION SECURITY TECHNOLOGIES
|9
|1795
|21