Page 395 - IT 402 v2.0 class 10
P. 395

digital certificate represented by a golden lock in the web browser s address bar signifies that the website
            is secure.  eb addresses that start with  https  also signify that the website is secure.

            Avoid using Unsecured Wi-Fi

            Never connect your device to any unsecured or unknown  i-Fi network.  onnecting to an unsecure network
            might lead to leakage of your valuable data.

            Don’t Accept Unknown Invitation

            Never accept invitations from an unknown person on social media. It may be an attempt to  ust get your
            personal profile related information such as phone number  e-mail  address  etc.

            Use Antivirus and Antispyware Software

             sing licensed antivirus software  antispyware software  firewall  etc.  are some measures to reduce cyber
            attacks.   lways  keep  these  software  up-to-date.   ntivirus  and   ntispyware  software  offer  real  time  to
            computer from malwares and reduce the risk of getting hacked.
            Clear Browser Cookies Frequently

             ookies are the files that are temporarily downloaded from a website and stored in the local computer when
            a person visits that website.

            Step 1:  Click on Tools at top right corner of the browser.
            Step 2:   o to Satefy    elete  ro sing  istor .

            Step 3:  Select the checkboxes for each data   ookies and website data   istory   emporary internet files
                    etc.) which you want to delete from Internet Explorer browser. To delete Cookies, select Cookies and
                     e site data.
            Step 4:  Click on Delete button.



























            Though cookies are meant for storing the information related to activities performed during previous browsing
            such as details of login, shopping cart, visited pages of a website, etc., but it can be tracked and misused by
            unauthorised users, to possibly gain access to the stored personal information. Therefore, after completing
            the work, refresh the operation before leaving the computer for others to use.





                                                                       Web Security and Workplace Safety       393
   390   391   392   393   394   395   396   397   398   399   400