Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

This lab will walk you through reading a program and ask you to investigate some privacy concerns. You know the exploits:malware, infected downloads, spyware, fraudulent

This lab will walk you through reading a program and ask you to investigate some privacy concerns. You know the exploits:malware, infected downloads, spyware, fraudulent Web sites, rogue JavaScripts. ( THIS LAB IS FOR MacBook Air)

  1. Investigate the privacy policy of a social media source of your choosing. Some suggestions are SnapChat, Kik, Tinder, Instagram, Tumblr, Imgur, YikYak, Twitter, etc. How difficult was it to find their privacy polices? Discuss their policies about how your personal information, images, or conversations are stored, what sort of information is gathered, and who your informationmaybesharedwith.
  2. For this you'll need a MacBook Air, desktop with Google Chrome installed. Chrome is a free browser. If it is not currently installed on your device, take a moment to do so before proceeding.
  • Turn on Safe Browsing.

Google maintains a list of Websites that may contain malware or phishing exploits and will display a warning when a site is unsafe. To make sure that Chrome is set to use this feature, select the three dots in the upper-right corner of the browser window and choose Settings. From the Settings menu, scroll down and select the link "Show advanced settings." In the Privacy section, make sure there is a check mark in the box labeled "Protect you and your device from dangerous sites."

  • Block third-party cookies.

Blocking third-party cookies can prevent unethical marketers from serving up personalized ads that could lead to sketchy sites if clicked. To block third-party cookies, select the box labeled "Content settings..." Make sure there is a check mark in the box"Block Third-party cookies sitedata."

  • Reduce the risk of malicious scripting.

As you know from previous modules, JavaScript is used to create dynamic Web pages. It can also be used to deliver malware and carry out intrusions. In the Privacy section, select the button labeled "Content settings..." Scroll down, if necessary, to the JavaScript section.

If you select "Do not allow any site to run JavaScript," your browser will be more secure .Stop download exploits.

Even trusted sites might get hacked so that malware is surreptitiously downloaded along with legitimate files. To limit downloads to single file your choosing,scroll down

to the section entitled "Automatic downloads" and choose the option"Ask When a site tries To Download Files Automatically..."

QUESTIONS FOR 2 PART ARE BELOW :

  1. Screenshot and save your security settings.
  2. Take a screenshot of the current content settings.
  3. Select the Done button to complete the content Settings configuration.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Datacasting How To Stream Databases Over The Internet

Authors: Jessica Keyes

1st Edition

007034678X, 978-0070346789

More Books

Students also viewed these Databases questions

Question

40 Job pricing and pay structures.

Answered: 1 week ago

Question

How do Excel Pivot Tables handle data from non OLAP databases?

Answered: 1 week ago