Cybersecurity in Web-Based Attacks: IE Security Flaws and Mitigation

Verified

Added on  2022/08/26

|4
|728
|16
Discussion Board Post
AI Summary
This discussion post examines the security vulnerabilities of Internet Explorer (IE), a historically problematic web browser developed by Microsoft. It details various security flaws, including code execution overflows, bypass vulnerabilities, and unauthorized access issues, highlighting how these flaws enable hackers to steal Windows users' data. The assignment emphasizes the significance of addressing these vulnerabilities to protect user data and reduce cybercrime. It also provides mitigation techniques and approaches such as using firewalls, enabling Windows defenders, creating strong passwords, disallowing third-party cookies, and implementing backup plans with two-factor authentication. The post underscores the importance of proactive security measures to safeguard sensitive information while using web browsers. The provided solution is a discussion forum post submitted by a student to Desklib, a platform offering AI-based study tools.
Document Page
INFORMATION SECURITY 0
Cyber Defense in Web Based
Attacks
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INFORMATION SECURITY 1
Module 10: hacking Internet Explorer
Internet explorer security
Internet Explorer is a series of graphical web browsers developed by Microsoft and
the most commonly utilized web browser. Security flaws occurred in the internet explorer
helps the hackers to perform cyber-crimes and gather sensitive data. There are various
security flaws that occur in the case of internet explorer that negatively impact on the
security of web browsers including exec code overflow, bypass, unauthorized access, CVE-
2020-0674 and many more. Singh, Jeong, & Park, (2016) reported that exec code overflow
is a common vulnerability that exists in the computing devices when internet explorer
improperly accesses objects in the memory systems.
A security flaw like bypass occurs when internet explorer is not able to validate the
effective security zone of requests for particular links or URLs. Unauthorized access occurs
due to a lack of privacy and the presence of malware signals in the web browsers that helps
criminals to perform hacking activities in an appropriate manner. From a recent study, it is
highlighted that CVE-2020-0674 is a major security flaw that occurs due to the presence of
bugs and traffic signals in the servers (Fernandes, et al., 2014).
The presence of such flaws or vulnerabilities negatively impacts on the web servers
and produces security-attacks in the systems. Therefore, it is significant to manage and
handle such vulnerabilities from the internet explorer for protecting data from hackers and
reducing the level of cyber-crimes. It is found that hackers can steal windows users’ data
for earning money and obtaining sensitive information including financial data, address,
and credit or debit card details and so on. In this modern era, many hackers steal windows
consumer data for performing cyber-crimes and reducing confidentiality and availability of
private information.
Mitigation techniques and approaches
It is significant to enhance the security of web browsers as the criminals attack on
the web browsers and transfer traffic signals that lead data breach and hacking-related
Document Page
INFORMATION SECURITY 2
problems. It is suggested that users should focus on the unauthorized access and block
from the web browsers using firewall-based networks and security systems in the
computing devices. Virvilis, Mylonas, Tsalis, & Gritzalis, (2015) reported that the firewall is
an effective technique that helps to detect and address fraud signals transferred by the
criminals.
Moreover, users should enable windows defenders in the web browsers by which
malware signals can be detected. The consumers require ensuring the confidentiality of
data for which they can include strong passwords in the computer networks and disallow
third-party cookies and servers used in the computing networks (Li, He, Akhawe, & Song,
2014). The users should include backup plans by which they can protect personal
information and enable 2-step verification in order to handle the unauthorized activities.
All these are effective techniques and approaches by which users can secure sensitive
information while utilizing web browsers.
Document Page
INFORMATION SECURITY 3
References
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security
issues in cloud environments: a survey. International Journal of Information
Security, 13(2), 113-170.
Li, Z., He, W., Akhawe, D., & Song, D. (2014). The emperor’s new password manager:
Security analysis of web-based password managers. In 23rd {USENIX} Security
Symposium ({USENIX} Security 14), 12(6), 465-479.
Singh, S., Jeong, Y. S., & Park, J. H. (2016). A survey on cloud computing security: Issues,
threats, and solutions. Journal of Network and Computer Applications, 75(6), 200-
222.
Virvilis, N., Mylonas, A., Tsalis, N., & Gritzalis, D. (2015). Security Busters: Web browser
security vs. rogue sites. Computers & Security, 52(6), 90-105.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]