Topicm4590ca0c76aab375_1528449000663_0Topic

Browser security

Levelm4590ca0c76aab375_1528449084556_0Level

Second

Core curriculumm4590ca0c76aab375_1528449076687_0Core curriculum

Grades IV–VI

V. Compliance with law and safety principles. The student:

3) identifies threats associated with the common access to technologies and information and describes the methods of avoiding them;

4) uses antivirus preventive measures and can protect the computer and information contained in it against threats.

Timingm4590ca0c76aab375_1528449068082_0Timing

45 minutes

General objectivem4590ca0c76aab375_1528449523725_0General objective

Compliance with law and safety principles.

Specific objectivesm4590ca0c76aab375_1528449552113_0Specific objectives

1. Identifying threats associated with using a web browserweb browserweb browser.

2. Identifying the methods of avoiding threats associated with using a web browser.

Learning outcomesm4590ca0c76aab375_1528450430307_0Learning outcomes

The student:

- identifies threats associated with using a web browser,

- uses the methods of avoiding threats associated with using a web browser.

Methodsm4590ca0c76aab375_1528449534267_0Methods

1. Discussion.

2. Learning through observation.

Forms of workm4590ca0c76aab375_1528449514617_0Forms of work

1. Individual work.

2. Class work.

LESSON STAGESm4590ca0c76aab375_1528450135461_0LESSON STAGES

Introductionm4590ca0c76aab375_1528450127855_0Introduction

The teacher initiates a short discussion about the security of web browsers.

- What web browsers do you know?
- What are their functions? (web browsing, bookmarks, browsing history, downloading files, private browsingprivate browsingprivate browsing)
- What threats are associated with using web browsers?

Procedurem4590ca0c76aab375_1528446435040_0Procedure

web browserweb browserweb browser is a software which is installed on almost every computer, tablet or smartphone. None of web browsers is completely securesecuresecure. Each of them has security vulnerabilities, which can be eagerly detected by hackers and used to breach the security of your computer. It is crucial to make every effort to ensure that your “favourite” web browser is as secure as possible.

Phishing is an Internet fraudInternet fraudInternet fraud, the form of data theft, that is committed by displaying a „malicious website” in order to obtain sensitive information such as passwords, account details or credit card numbers. Phishing attacks are carried out most often with the use of fake email messages which encourage the recipients to update their personal data at fake websites, which usually look identical to the legitimate sites.

Malware is a malicious software. It can be also placed on websites.

The anti‑phishing and anti‑malware security of web browsers checks every visited website and compares it with the lists of known malicious websites. This feature should be obligatorily enabled.

Anti‑phishing security that blocks fake websites is one of the features of the majority of available antivirus software. When you use the Internet, make sure that this feature is enabled in your antivirus programme.

Task 1

In the antivirus software installed on your computer find settings that are responsible for browser security.

In order to harden your browser security:

- configure the security and privacy settings of your browser,
- keep your browser updated,
- use encrypted connections (the HTTPS protocol),
- be cautious when you install add‑ons since every add‑on decreases browser security,
- install security plug‑ins, e.g. HTTPS Everywhere, Web of Trust (WOT),
- check short links,
- regularly empty the temporary and downloaded files folders of your browser,
- do not save your passwords in web browsers,
- use an account without administrator privileges while browsing the Internet,
- block pop‑up ads.
m4590ca0c76aab375_1527752256679_0- configure the security and privacy settings of your browser,
- keep your browser updated,
- use encrypted connections (the HTTPS protocol),
- be cautious when you install add‑ons since every add‑on decreases browser security,
- install security plug‑ins, e.g. HTTPS Everywhere, Web of Trust (WOT),
- check short links,
- regularly empty the temporary and downloaded files folders of your browser,
- do not save your passwords in web browsers,
- use an account without administrator privileges while browsing the Internet,
- block pop‑up ads.

[Slideshow]

Task 2

On the Internet find the information about how to remove temporary filestemporary filestemporary files from the cache in popular web browsers.

Task 3

Check in the web browserweb browserweb browser installed on your computer in what location temporary files and files downloaded from the Internet are stored.

Task 4

How can you check to which website a short URL leads?

Reminder:

SSL is a protocol used to provide secure data transmission over computer networks by encrypting the data transmitted. It uses certificates issued by trusted certificate authorities. Due to its application, more secure services have been developed, e.g. HTTPS, which is the encrypted version of HTTP.m4590ca0c76aab375_1527752263647_0SSL is a protocol used to provide secure data transmission over computer networks by encrypting the data transmitted. It uses certificates issued by trusted certificate authorities. Due to its application, more secure services have been developed, e.g. HTTPS, which is the encrypted version of HTTP.

Most web browsers display information about the type of communication and certificatescertificatescertificates of websites in their address baraddress baraddress bar.

[Illustration 1]

[Illustration 2]

[Illustration 3]

When the computer you are using is not your own, do not perform operations that require transmitting sensitive data. If you have to use this computer, enable private browsingprivate browsingprivate browsing.

Using private browsing disables collecting and storing information about the operations of a user. When you leave the privacy mode of your browser, none of the following information should be saved:

- browsing history,
- downloaded files history,
- data in cookiescookiescookies,
- filled‑in text boxes in forms,
- search history,
- the temporary filestemporary filestemporary files of visited websitesvisited websitesvisited websites,
- website settings.

Task 5

On the Internet find the information about how to run private browsing in popular web browsers.

Lesson summarym4590ca0c76aab375_1528450119332_0Lesson summary

securesecuresecure browser:

- enables to download auto updates,
- has the feature that protects against phishing;
- protects data during their transfer by encrypting them.

Selected words and expressions used in the lesson plan

address baraddress baraddress bar

certificatescertificatescertificates

cookiescookiescookies

Internet fraudInternet fraudInternet fraud

pop‑up adspop‑up adspop‑up ads

private browsingprivate browsingprivate browsing

securesecuresecure

temporary filestemporary filestemporary files

visited websitesvisited websitesvisited websites

web browserweb browserweb browser

m4590ca0c76aab375_1527752263647_0
m4590ca0c76aab375_1527752256679_0
m4590ca0c76aab375_1528449000663_0
m4590ca0c76aab375_1528449084556_0
m4590ca0c76aab375_1528449076687_0
m4590ca0c76aab375_1528449068082_0
m4590ca0c76aab375_1528449523725_0
m4590ca0c76aab375_1528449552113_0
m4590ca0c76aab375_1528450430307_0
m4590ca0c76aab375_1528449534267_0
m4590ca0c76aab375_1528449514617_0
m4590ca0c76aab375_1528450135461_0
m4590ca0c76aab375_1528450127855_0
m4590ca0c76aab375_1528446435040_0
m4590ca0c76aab375_1528450119332_0
web browser1
web browser

przeglądarka internetowa

R1M7JcmXbpBWr1
wymowa w języku angielskim: web browser
private browsing1
private browsing

tryb prywatny

R1ZUiBjMxTZVn1
wymowa w języku angielskim: private browsing
secure1
secure

bezpieczna

R7v0yJPVx7f1V1
wymowa w języku angielskim: secure
internet fraud1
internet fraud

oszustwo internetowe

R2x4dQ9n0x1cM1
wymowa w języku angielskim: Internet fraud
temporary files1
temporary files

pliki tymczasowe

R17Hf3iYIIlnS1
wymowa w języku angielskim: temporary files
certificates1
certificates

certyfikaty

R3k8et0BdjEOm1
wymowa w języku angielskim: certificates
address bar1
address bar

pasek adresu

R4XLjuOouZN8z1
wymowa w języku angielskim: address bar
cookies1
cookies

ciasteczka

R96umKIbkmhDS1
wymowa w języku angielskim: cookies
visited websites1
visited websites

odwiedzane witryny

RJgalvHNUNJYM1
wymowa w języku angielskim: visited websites
pop‑up ads1
pop‑up ads

wyskakujące okna

RQ2899W8jmIyG1
wymowa w języku angielskim: pop‑up ads