Page 3 - LN
P. 3
Lesson Note
An anonymous browser lets users access websites anonymously. It can be used as a tool for
governments, journalists and everyday security-conscious surfers.
Examples: Tor browser, Epic browser
Private Browsing
A type of browsing wherein browser opens in incognito mode or through proxy or VPN, and
does not store cookies about your online activity, is called Private browsing.
Incognito browsing opens up a version of the browser that will not track your activity.
Useful for entering sensitive data like bank etc. Search engine like DuckDuckgo also
useful for private browsing.
Proxy works by acting as a middleman between your computer and the website you
want to access. Now the tracking website will get the IP address and information that
belongs to the proxy site.
Virtual Private Network or a VPN is a method used to add security and privacy to
private and public networks, like WiFi hotspots and the Internet. VPNs are most often
used by corporations to protect sensitive data.
Confidentiality of information
It ensures that only authorized users get access to sensitive and protected data.
Internet is a public platform.
But information like your credit history or bank details, mails etc should be confidential.
A user may need that crucial information is protected and is not publically visible.
Confidentiality of information ensures that only authorized users get access to sensitive and
protected data.
Practices to ensure confidentiality of Information:
1. Use firewall wherever possible
Firewall is a program that monitors all communications and traps all illicit packets. Most
operating systems now come with a firewall preinstalled. Firewall monitors both incoming
and outgoing communication and traps the illicit ones.
2. Control browser settings to block tracking
Websites track a user’s surfing. To control turn on default browser settings to exclude
cookies especially third party cookies.
3. Browse privately wherever possible. Prefer private browsing wherever possible.
4. Be careful while posting on Internet
5. Ensure Safe sites while entering crucial information
For some activities like online form fill up etc user may need to give personal details to the
web site. In such cases, ensure these things:
TYPE THE URL (Uniform Resource Locator) ON YOUR OWN in the address bar of the
web browser, in spite of suggestions.
Ensure that the address contains HTTP and a pad lock sign. A safe site’s URL starts
with https:// and not with http://. Also, it shows a closed pad lock.
6. Carefully handle emails