Page 3 - LN
P. 3

Lesson Note


               An anonymous browser lets users access websites anonymously. It can be used as a tool for
               governments, journalists and everyday security-conscious surfers.
               Examples:   Tor browser, Epic browser


               Private Browsing
               A type of browsing wherein browser opens in incognito mode or through proxy or VPN, and
               does not store cookies about your online activity, is called Private browsing.
                     Incognito browsing opens up a version of the browser that will not track your activity.
                       Useful for entering sensitive data like bank etc. Search engine like DuckDuckgo also
                       useful for private browsing.
                     Proxy works by acting as a middleman between your computer and the website you
                       want to access. Now the tracking website will get the IP address and information that
                       belongs to the proxy site.
                     Virtual Private Network or a VPN is a method used to add security and privacy to
                       private and public networks, like WiFi hotspots and the Internet. VPNs are most often
                       used by corporations to protect sensitive data.


               Confidentiality of information
               It ensures that only authorized users get access to sensitive and protected data.
               Internet is a public platform.
               But information like your credit history or bank details, mails etc should be confidential.
               A user may need that crucial information is protected and is not publically visible.
               Confidentiality of information ensures that only authorized users get access to sensitive and
               protected data.

               Practices to ensure confidentiality of Information:
               1.  Use firewall wherever possible
                   Firewall is a program that monitors all communications and traps all illicit packets. Most
                   operating systems now come with a firewall preinstalled. Firewall monitors both incoming
                   and outgoing communication and traps the illicit ones.
               2.   Control browser settings to block tracking
                   Websites track a user’s surfing. To control turn on default browser settings to exclude
                   cookies especially third party cookies.
               3.  Browse privately wherever possible. Prefer private browsing wherever possible.
               4.  Be careful while posting on Internet
               5.  Ensure Safe sites while entering crucial information
                   For some activities like online form fill up etc user may need to give personal details to the
                   web site. In such cases, ensure these things:
                       TYPE THE URL (Uniform Resource Locator) ON YOUR OWN in the address bar of the
                        web browser, in spite of suggestions.
                       Ensure that the address contains HTTP and a pad lock sign. A safe site’s URL starts
                        with https:// and not with http://. Also, it shows a closed pad lock.
               6.  Carefully handle emails
   1   2   3   4   5   6   7   8