logo

Web Browser Attacks | Report

   

Added on  2020-04-01

8 Pages1698 Words65 Views
Running head: WEB BROWSER ATTACKSWeb Browser AttacksName of the StudentStudent IDSubject CodeSessionAssessment NumberName of the UniversityAuthor’s Note:

1WEB BROWSER ATTACKSExecutive SummaryThe main aim of this report is to understand the basic concept of the attacks on web browsers.Web browser is the application of software, which allows all the users to interact with all thecontents of a particular web page. A web browser is utilized for presenting and retrieving alltypes of information and resources. The report helps to identify the problems faced by the usersand all the relevant technologies that help a hacker to attack on the web browsers. Moreover, theimpact of these attacks are also mentioned here.

2WEB BROWSER ATTACKSTable of ContentsIntroduction......................................................................................................................................3Discussion........................................................................................................................................3Web Browser Attacks..................................................................................................................3Problems..................................................................................................................................4Relevant Technologies.............................................................................................................4Impact of Web Browser Attacks..............................................................................................5Most Important Lesson............................................................................................................5Conclusion.......................................................................................................................................6References........................................................................................................................................7

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Assignment
|12
|2105
|34

Assessment of Work and Progress Towards Learning Outcomes
|9
|2156
|186

Cryptocurrency and Cryptocurrency Hijacking
|9
|1276
|419

Cross Site Scripting
|10
|2020
|363

HTML Assignment | Evolution of HTML
|10
|2359
|154

Assignment on Oracle Virtual Machine Installation
|16
|1480
|225