Untangling the Web Finding Your Forgotten Assets

Total Page:16

File Type:pdf, Size:1020Kb

Untangling the Web Finding Your Forgotten Assets Bachelor of Science in Computer Science June 2018 Untangling the Web Finding Your Forgotten Assets Victoria Sigurdsson Faculty of Computing, Blekinge Institute of Technology, 371 79 Karlskrona, Sweden This thesis is submitted to the Faculty of Computing at Blekinge Institute of Technology in partial fullment of the requirements for the degree of Bachelor of Science in Computer Science. The thesis is equivalent to 10weeks of full time studies. The authors declare that they are the sole authors of this thesis and that they have not used any sources other than those listed in the bibliography and identied as references. They further declare that they have not submitted this thesis at any other institution to obtain a degree. Contact Information: Author(s): Victoria Sigurdsson E-mail: [email protected] University advisor: Associate Professor Emiliano Casalicchio Department ofComputer Science and Engineering Faculty ofComputing Internet : www.bth.se Blekinge Institute ofTechnology Phone : +46 455 38 50 00 SE371 79 Karlskrona, Sweden Fax : +46 455 38 50 57 Abstract Background. In the years between 2016 and 2017, the number of attacks against web application increased by approximately 21.89percent. The total recorded amount of incidents during 2017 was 6,502 [9, 10]. To assure security, patching and scanning are required. This assumes that the company is aware of all their external facing web applications. The company Outpost24 is observing an increased request for a solution capable of nding all external web application owned by one company. Objectives. This thesis study six methods to identify assets owned by one com- pany. The methods are classied into weak and strong indicators. Based on the classications, two algorithms are developed. The algorithms are executed against two companies, Outpost24 and Company A. The objective is to evaluate the six methods and decide if the methods are suitable for retrieving assets owned by one company. Methods. This study includes two experiments testing the two algorithms on two dierent companies. The experiments focus on to retrieve assets and data to make a decision upon the ownership of the assets. The observed data from the experiments are compared against data known by the two companies to verify if any data is un- known to the company prior to the experiment. Results. The results show that the identied methods are suitable for both identify assets and to decide upon ownership. Furthermore, assets not previously known was possible to identify. The results from the two methods are visualized as two node maps, providing an overview of identied assets. Conclusions. It was concluded that there are methods that are useful when extract- ing assets from one given assets, and there are methods useful for extracting data used when deciding upon the owner. The methods will assist companies in raising their own awareness of their external facing assets, and in some cases identify assets which were previously unknown to them. Keywords: Forgotten assets, web application, asset retrieval, security Contents Abstract i 1 Introduction 1 1.1 Research Focus .............................. 2 1.2 Research Process ............................. 2 1.3 Methodology ............................... 2 2 Background 4 2.1 Web crawling ............................... 4 2.2 Web Application Vulnerability Scanning ................ 4 2.3 Domain Name System .......................... 5 3 Related Work 7 3.1 Relationship between websites ...................... 7 3.2 Hyperlinks ................................. 7 3.3 DNS lookup ................................ 8 3.4 Subdomain enumeration ......................... 8 3.5 Google Hacking .............................. 8 3.6 Shared indicators ............................. 9 3.6.1 Web Analytics Tools ....................... 9 3.6.2 Multi-Domain SSL Certicates ................. 9 3.6.3 Authorship identication ..................... 10 4 Classicaton 12 4.1 Indicators ................................. 12 4.1.1 Strong indicator .......................... 12 4.1.2 Weak indicators . ......................... 13 5 Implementation 17 5.1 Strong and weak indicators ........................ 17 5.1.1 Study: Strong Indicators ..................... 17 5.2 Logic .................................... 18 5.3 Decision .................................. 20 6 Results 23 6.1 Outpost24.com .............................. 23 6.2 Company A ................................ 26 iii 7 Analysis and Discussion 30 7.1 Experiment 1 - Outpost24 ........................ 30 7.2 Experiment 2 - Company A ....................... 30 7.3 Discussion ................................. 31 8 Conclusions and Future Work 33 References 36 Appendix A Strong Indicators 38 Appendix BWeak Indicators 48 Appendix C OUTPOST24 web portfolio 50 Appendix D Asset map 52 D.1 Outpost24 ................................. 53 D.2 Company A ................................ 54 iv List of Tables 1 Dierence between certicate types ................... 15 2 Study of connections between domains ................. 19 3 Unique assets owned by Outpost24 ................... 25 4 The frequency of methods used for asset retrieval ........... 25 5 Outpost24 - The frequency of methods used for deciding owner .... 25 v Glossary asset Umbrella term for a website, IP address or domain name indicator Information extracted from an asset that is used when deciding upon ownership between assets owner Person or company owning an asset strong indicator An indicator that gives an almost 100 percent guarantee that the assets are owned by the same owner weak indicator An indicator that, when on its own, does not provide evidence enough on the ownership be- tween two assets.However, considered to- gether with other weak indicators increases the chance for identical ownership vii Chapter 1 Introduction Almost every company today needs an online presence. One example is for commer- cial stores where an increased shift to online shopping has been observed between the years 2014 and 2017 [8]. The Internet allows companies to reach a broader market, reducing geographical limitations and boosting growth. Furthermore, companies web applications are accessible to internet users through search engines. An online presence introduces the potential risk of an event of a breach. The amount of incidents in which a web application is the vector of attack has increased by approximately 21.89 percentage between 2016 and 2017, with a total recorded amount of 6,502 incidents during 2017 [9, 10]. One of the greater breaches of 2017 disclosed personal data of 145 million people. A breach at this altitude could potentially damage the entire brand of a company and decrease their reliability. Having an online presence and avoiding a potential breach is achieved through monitoring and securing the web applications. Furthermore, apply security patches and perform regular scans of the web applications increases the security [11, 6]. How- ever, this assumes that the company is aware of all external facing web applications owned by them. Outpost24, a company providing vulnerability management solutions, is observ- ing an increased need for a solution capable of enumerating all external facing web applications owned by one company. It is of great importance for the companies to have knowledge of their external facing web applications to secure their brand and condential information. Every web application not monitored poses a potential risk of a breach. The need originates from companies with poor or zero knowledge of their external facing assets. Furthermore, the companies experience a great uncertainty of their digital ownership. The main focus of this research is on identifying methods to extract unknown assets from known assets. The ability to determine ownership through the methods is crucial for the goal to identify external facing assets owned by one company. Ownership in this context, and throughout the research, is dened as the company in charge of the asset, or a person employed by the company. This information will assist Outpost24 in providing a solution that meets the increased need seen among customers and prospects. 1 2 Chapter 1. Introduction 1.1 Research Focus This study is driven by two research questions that will be examined and answered in this thesis work: RQ1. What methods can be used to identify other assets from one known domain name? RQ2. What is the accuracy in assuming the ownership of an asset, and what cases are user guidance required? 1.2 Research Process To be able to answer the research questions, the research is divided into two phases. Each phase provides an answer to one research question. The rst phase is devoted to identify dierent methods that can be used to extract unknown domains from given domains and provide an answer to the rst research question(RQ1). The second and last phase concerns categorization and evaluation of the methods to provide an answer to the second research question(RQ2). 1.3 Methodology The methodology is based on the work written by C.R. Kothari (2004) where four research approaches are discussed [4]. Each approach contains two counterparts. Descriptive vs. Analytical This research is analytical as data from companies is used for evaluation of the theories. Applied vs. Fundamental A solution needs to be found for a practical problem which makes the research applied. Quantitative vs. Qualitative This research is qualitative as theories need to be dened for deciding upon ownership for assets. Conceptual vs. Empirical This research tests hypothesis
Recommended publications
  • Large-Scale, Automatic XSS Detection Using Google Dorks
    Large-Scale, Automatic XSS Detection using Google Dorks Riccardo Pelizzi Tung Tran Alireza Saberi Abstract XSS Attacks continue to be prevalent today, not only because XSS sanitization is a hard problem in rich- formatting contexts, but also because there are so many potential avenues and so many uneducated developers who forget to sanitize reflected content altogether. In this paper, we present Gd0rk, a tool which em- ploys Google’s advanced search capabilities to scan for websites vulnerable to XSS. It automatically generates Figure 1: CVE vulnerabilities for 2010 and maintains a database of parameters to search, and uses heuristics to prioritize scanning hosts which are degrees of client-side support with a primarily server- more likely to be vulnerable. Gd0rk includes a high- side XSS defense [37, 23, 31]. However, the diffusion of throughput XSS scanner which reverse engineers and ap- such methods remains limited: hybrid methods require proximates XSS filters using a limited number of web re- support from both clients and servers. Since the party quests and generates working exploits using HTML and that is most directly affected by an XSS attack is the user JavaScript context-aware rules. who accesses a vulnerable server, client-side protections The output produced by the tool is not only a remark- are thus desirable (despite their limitation to so-called re- ably vast database of vulnerable websites along with flected XSS) and have been developed [29,4, 17, 11]. working XSS exploits, but also a more compact repre- However, client-side defenses are no definitive solution sentation of the list in the form of google search terms, either: IE8 regular-expression based approach is easy whose effectiveness has been tested during the search.
    [Show full text]
  • Recent Developments in Cybersecurity Melanie J
    American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime
    [Show full text]
  • Hacking the Master Switch? the Role of Infrastructure in Google's
    Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s by John Harris Stevenson A thesis submitteD in conformity with the requirements for the Degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by John Harris Stevenson 2017 Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s John Harris Stevenson Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract During most of the decade of the 2000s, global Internet company Google Inc. was one of the most prominent public champions of the notion of network neutrality, the network design principle conceived by Tim Wu that all Internet traffic should be treated equally by network operators. However, in 2010, following a series of joint policy statements on network neutrality with telecommunications giant Verizon, Google fell nearly silent on the issue, despite Wu arguing that a neutral Internet was vital to Google’s survival. During this period, Google engaged in a massive expansion of its services and technical infrastructure. My research examines the influence of Google’s systems and service offerings on the company’s approach to network neutrality policy making. Drawing on documentary evidence and network analysis data, I identify Google’s global proprietary networks and server locations worldwide, including over 1500 Google edge caching servers located at Internet service providers. ii I argue that the affordances provided by its systems allowed Google to mitigate potential retail and transit ISP gatekeeping. Drawing on the work of Latour and Callon in Actor– network theory, I posit the existence of at least one actor-network formed among Google and ISPs, centred on an interest in the utility of Google’s edge caching servers and the success of the Android operating system.
    [Show full text]
  • Google Dorks: Use Cases and Adaption Study
    Google dorks: Use cases and Adaption study UNIVERSITY OF TURKU Department of Future Technologies Master of Science in Technology Thesis Networked Systems Security October 2020 Reza Abasi Supervisors: Dr. Ali Farooq Dr. Antti Hakkala The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin OriginalityCheck service. i UNIVERSITY OF TURKU Department of Future Technologies Reza Abasi: Google dorks: Use cases and adaption study Master of Science in Technology Thesis, 93 pages. Networked Systems Security October 2020 The information age brought about radical changes in our lives. More and more assets are getting connected to the Internet. On the one hand, the connectivity to this ever-growing network of connected devices and assets (the Internet) precipitates more convenience and access to various resources. However, on the downside, the Internet could be the hotbed for malicious actors like hackers, attackers, and cybercriminals’ communities. Continuous Penetration testing and monitoring of the sites, and forums providing illicit digital products and services is a must-do task nowadays. Advanced searching techniques could be employed for discovering such forums and sites. Google dorks that are utilizing Google’s advanced searching techniques could be applied for such purpose. Google dorks could be used for other areas that we will explain during this thesis in more detail like information gathering, vulnerability detection, etc. The purpose of this thesis is to propose advanced searching techniques that will help cybersecurity professionals in information gathering, reconnaissance, vulnerability detection as well as cyber criminal investigative tasks. Further, a usability study has been conducted to examine the acceptance of these techniques among a group of cybersecurity professionals.
    [Show full text]
  • Google Hacking 101
    Google Hacking 101 Edited by Matt Payne, CISSP 15 June 2005 http://MattPayne.org/talks/gh 1 Outline • Google Bombing • Schneier in Secrets and Lies – Attack at a distance – Emergent behavior – Automation • Google as a mirror • “Interesting Searches” – Software versions – Passwords, credit card numbers, ISOs • CGI Scanning – Vulnerable software • Defense against Google Hacking 2 Google Bombing != Google Hacking • http://en.wikipedia.org/wiki/Google_bomb • A Google bomb or Google wash is an attempt to influence the ranking of a given site in results returned by the Google search engine. Due to the way that Google's Page Rank algorithm works, a website will be ranked higher if the sites that link to that page all use consistent anchor text. 3 So What Determines Page Relevance and Rating? • Exact Phrase: are your keywords found as an exact phrase in any pages? • Adjacency: how close are your keywords to each other? • Weighting: how many times do the keywords appear in the page? • PageRank/Links: How many links point to the page? How many links are actually in the page? Equation: (Exact Phrase Hit)+(AdjacencyFactor)+(Weight) * (PageRank/Links) 4 From: Google 201, Advanced Googology - Patrick Crispen, CSU Simply Put • “Google allows for a great deal of target reconnaissance that results in little or no exposure for the attacker.” – Johnny Long • Using Google as a “mirror” searches find: – Google searches for Credit Card and SS #s – Google searches for passwords – CGI (active content) scanning 5 Anatomy of a Search Server Side Client Side http://computer.howstuffworks.com/search-engine1.htm 6 How Google Finds Pages • Are only connected web pages indexed? • NO! – Opera submits every URL viewed to Google for later indexing….
    [Show full text]
  • EVILSEED: a Guided Approach to Finding Malicious Web Pages
    2012 IEEE Symposium on Security and Privacy EVILSEED: A Guided Approach to Finding Malicious Web Pages Luca Invernizzi Paolo Milani Comparetti UC Santa Barbara Lastline, Inc. and Vienna Univ. of Technology [email protected] [email protected] Stefano Benvenuti Christopher Kruegel University of Genova UC Santa Barbara [email protected] [email protected] Marco Cova Giovanni Vigna Lastline, Inc. and University of Birmingham UC Santa Barbara [email protected] [email protected] Abstract—Malicious web pages that use drive-by download In addition to drive-by-download exploits, cybercriminals attacks or social engineering techniques to install unwanted also use social engineering to trick victims into installing or software on a user’s computer have become the main avenue running untrusted software. As an example, consider a web for the propagation of malicious code. To search for malicious web pages, the first step is typically to use a crawler to collect page that asks users to install a fake video player that is URLs that are live on the Internet. Then, fast prefiltering presumably necessary to show a video (when, in fact, it is a techniques are employed to reduce the amount of pages that malware binary). Another example is fake anti-virus programs. need to be examined by more precise, but slower, analysis These programs are spread by web pages that scare users into tools (such as honeyclients). While effective, these techniques thinking that their machine is infected with malware, enticing require a substantial amount of resources. A key reason is that the crawler encounters many pages on the web that are benign, them to download and execute an actual piece of malware as that is, the “toxicity” of the stream of URLs being analyzed is a remedy to the claimed infection- [4], [5].
    [Show full text]
  • Pulp Google Hacking:The Next Generation Search Engine Hacking
    Pulp Google Hacking The Next Generation Search Engine Hacking Arsenal 3 August 2011 – Black Hat 2011 – Las Vegas, NV Presented by: Francis Brown Rob Ragan Stach & Liu, LLC www.stachliu.com Agenda O V E R V I E W • Introduction/Background • Advanced Attacks • Google/Bing Hacking - Core Tools • NEW Diggity Attack Tools • Advanced Defenses • Google/Bing Hacking Alert RSS Feeds • NEW Diggity Alert Feeds and Updates • NEW Diggity Alert RSS Feed Client Tools • Future Directions 2 Introduction/ Background G E T T I N G U P T O S P E E D 3 Open Source Intelligence S E A R C H I N G P U B L I C S O U R C E S OSINT – is a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence. 4 Google/Bing Hacking S E A R C H E N G I N E A T T A C K S 5 Google/Bing Hacking S E A R C H E N G I N E A T T A C K S Bing's source leaked! class Bing { public static string Search(string query) { return Google.Search(query); } } 6 Attack Targets G O O G L E H A C K I N G D A T A B A S E • Advisories and Vulnerabilities (215) • Pages containing network or • Error Messages (58) vulnerability data (59) • Files containing juicy info (230) • Sensitive Directories (61) • Files containing passwords (135) • Sensitive Online Shopping Info (9) • Files containing usernames (15) • Various Online Devices (201) • Footholds (21) • Vulnerable Files (57) • Pages containing login portals (232) • Vulnerable Servers (48) • Web Server Detection (72) 7 Google Hacking = Lulz R E A L W O R L D T H R E A T LulzSec and Anonymous believed to use Google Hacking as a primary means of identifying vulnerable targets.
    [Show full text]
  • 0321518667 Sample.Pdf
    Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was Editor in Chief aware of a trademark claim, the designations have been printed with initial capital letters or Karen Gettman in all capitals. Acquisitions Editor The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or Jessica Goldstein omissions. No liability is assumed for incidental or consequential damages in connection Development Editor with or arising out of the use of the information or programs contained herein. Sheri Cain The views expressed in this article are those of the author and do not reflect the official Managing Editor policy or position of the U.S. Military Academy, the Department of the Army, the Department of Defense, or the U.S. government. Kristy Hart The publisher offers excellent discounts on this book when ordered in quantity for bulk Project Editor purchases or special sales, which may include electronic versions and/or custom covers and Jovana San Nicolas- content particular to your business, training goals, marketing focus, and branding interests. Shirley For more information, please contact: Copy Editor U.S. Corporate and Government Sales Krista Hansing Editorial (800) 382-3419 Services, Inc. [email protected] Indexer For sales outside the United States, please contact: Erika Millen International Sales [email protected] Proofreader Visit us on the web: www.informit.com/aw Kathy Ruiz Library of Congress Cataloging-in-Publication Data available on request.
    [Show full text]
  • Google Dorks: Analysis, Creation, and New Defenses
    Google Dorks: Analysis, Creation, and new Defenses Flavio Toffalini1, Maurizio Abb`a2, Damiano Carra1, and Davide Balzarotti3 1 University of Verona, Italy [email protected], flavio.toff[email protected] 2 LastLine, UK [email protected] 3 Eurecom, France [email protected] Abstract. With the advent of Web 2.0, many users started to maintain personal web pages to show information about themselves, their busi- nesses, or to run simple e-commerce applications. This transition has been facilitated by a large number of frameworks and applications that can be easily installed and customized. Unfortunately, attackers have taken advantage of the widespread use of these technologies { for exam- ple by crafting special search engines queries to fingerprint an application framework and automatically locate possible targets. This approach, usu- ally called Google Dorking, is at the core of many automated exploitation bots. In this paper we tackle this problem in three steps. We first perform a large-scale study of existing dorks, to understand their typology and the information attackers use to identify their target applications. We then propose a defense technique to render URL-based dorks ineffective. Finally we study the effectiveness of building dorks by using only com- binations of generic words, and we propose a simple but effective way to protect web applications against this type of fingerprinting. 1 Introduction In just few years from its first introduction, the Web rapidly evolved from a client-server system to deliver hypertext documents into a complex platform to run stateful, asynchronous, distributed applications. One of the main character- istics that contributed to the success of the Web is the fact that it was designed to help users to create their own content and maintain their own web pages.
    [Show full text]
  • Adversarial Information Retrieval on the Web
    Adversarial Information Retrieval on the Web Marcin Kaminski Motivation Adversarial Information Retrieval has been playing a big role in nowadays Web oriented environment. Almost everybody stores some sensitive content online. Therefore, it is important to know how Adversarial IR can affect us so we can be prepared and successfully protect our confidential data. Introduction During 14th International World Wide Web Conference in Chiba [1], Japan and SIGIR 2006 Conference in Seattle[2] the following subjects on Adversarial Information Retrieval on the Web were discussed: search engine spam and optimization, crawling the web without detection, link-bombing (a.k.a. Google-bombing), comment spam, referrer spam, blog spam (splogs), malicious tagging, reverse engineering of ranking algorithms, advertisement blocking, and web content filtering Introduction (cont) Using web crawlers to steal confidential information. Web Crawlers “A web crawler (also known as a Web spider or Web robot) is a program or automated script which browses the World Wide Web in a methodical, automated manner. Other less frequently used names for Web crawlers are ants, automatic indexers, bots, and worms” [3]. Web Crawlers (cont) a software agent populates the IP addresses on the fly or starts with the predefined list of URL addresses to visit. As it visits these URLs, it gathers all the links it has identified and adds them to the list of URLs to visit, called the crawl frontier . It will then visit these newly added URLs recursively. However, this flow allows some malicious action. a web crawler may reach a sensitive web content which originally was not intended to be available for public view.
    [Show full text]
  • Internet of Torment: the Governance of Smart Home Technologies Against Technology-Facilitated Violence
    Internet of Torment: The Governance of Smart Home Technologies against Technology-Facilitated Violence by Olivia Faria A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements for the degree of Master of Arts in Communication with specialization in Data Science Carleton University Ottawa, Ontario September 2020, Olivia Faria Abstract While smart home technologies (SHTs) such as smart speakers are often marketed as solutions to automate daily household activities and chores, such as managing calendars, ordering food, playing music or locking the doors, these same technologies can be used to cause harm. This thesis examines the emergence of smart home technology- facilitated violence (smart home TFV) in Canada to assess 1) how these Internet of Things (IoT) devices can be misused as technologies of torment and 2) how and why we may want to examine this phenomenon as part of a wider sociotechnical system of human and non-human actors. First, smart home technologies are situated in the history of home automation and gendered design, conceptually in the research of technology facilitated violence, within a Canadian policy and legal environment and as part of technical research on smart home technology safety by way of an interdisciplinary literature review. Secondly, a modified Walkthrough Method (Light, Burgess and Duguay, 2018) was applied to study the popular Google Nest Mini smart speaker to identify how this device may be misused, which features enable potential misuse and to better understand how the device is reflective of broader corporate values, visions and operating models. Thirdly, a hybrid theoretical framework combining assemblage theory (Kitchin, 2014), actor-network theory (Latour, 1988; Latour, 2005) and multi-scalar analysis (Edwards, 2003) was developed and applied to frame the study of this complex technological system and to structure the collection of observations and analyze results arranged into micro, meso and macro scales.
    [Show full text]
  • Google Chrome
    DIE FRAGE pixabay, Creative Commons CCO Browsen durch das Zwischennetz Colourbox.de BROWSER DER DATENSTROM im Zwischennetz DIE FRAGE SUCHMASCHINEN 5 DIE GESELLSCHAFT DER SUCHE 6 MAN KÖNNTE EINEN BROWSER ALS DAS TOR ZUR DIGITALEN WELT BEZEICHNEN. DENN DIESER IST DER »SCHLÜSSEL« ZUM INTERNET BZW. ZUM WWW, MIT DEM WIR SOWOHL PRIVATE ALS AUCH BERUFLICHE BROWSER AUFGABEN ERLEDIGEN. Nach der Eingabe einer Domain in die Adresszeile des Browsers wird die entsprechende Webseite vom Browser aufgerufen. Nach dem Erreichen der Webseite, enthält der Browser entsprechende Informationen, BROWSER welche Inhalte er laden soll. Was der Browser tut Nachdem der Ladevorgang abgeschlossen ist, stellt der Browser den Inhalt der Webseite in einer für den Nutzer lesbaren Form dar. DER VERRAT DER BROWSER BROWSER Was der Browser weiß https://www.netzwelt.de/tool s/wie-lautet-meine-ip.html Sind die Logindaten kompromittiert? BROWSER Vertrauen ist gut, aber IT-Sicherheit ist kein statischer Zustand, sondern ein laufender Prozess Kuketz-Blog 1. Sicheres Passwort 2. Regelmäßige Updates 3. Zurückhaltende Datenpreisgabe 4. Privatsphäreneinstellungen setzen BROWSER 5. Abzockerfallen erkennen REGELN 6. Sichere Downloads FÜR EINEN SICHEREN UMGANG MIT 7. Vorsicht im Internet NEUEN MEDIEN 8. Gesunden Menschenverstand nutzen 1. Sicheres Passwort 2. Regelmäßige Updates 3. Zurückhaltende Datenpreisgabe 4. Privatsphäreneinstellungen setzen BROWSER 5. Sicheres Surfen asdfghjklöä-:;MNBVCXY 6. Abzockerfallen erkennen 7. Sichere Downloads 8. Vorsicht im Internet 9. Gesunden Menschenverstand nutzen 1. Sicheres Passwort 2. Regelmäßige Updates 3. Zurückhaltende Datenpreisgabe 4. Privatsphäreneinstellungen setzen BROWSER 5. Abzockerfallen erkennen 6. Sichere Downloads 7. Vorsicht im Internet 8. Gesunden Menschenverstand nutzen 1. Sicheres Passwort 2. Regelmäßige Updates 3. Zurückhaltende Datenpreisgabe 4.
    [Show full text]