Computer Science
King Saud University Web Browser Security and Vulnerability Assessment Questions

king saud university

Question Description

I need help with a Computer Science question. All explanations and answers will be used to help me learn.

As a security architect, write a paper that addresses the questions below. Be sure to explain the process and steps you would use, as appropriate.

How would you minimize users clicking on links without considering the risks of their actions?

How would you address Web page addresses that are disguised or take you to an unexpected site?

How would you ensure that third-party software has a mechanism for receiving security updates?

How would you ensure users know how to configure their web browsers securely?

Deliverables:

Your paper should be 4-5 pages in length, not including the title and reference pages.

You must include a minimum of two credible sources and information from the module to support your writing.

Your paper must follow APA style guidelines, as appropriate.

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Please let me know if you need anything to be changed or
addedI will be happy to carry any changes, just leave me a
message and will get back to you as soon as I canBye for now, but will be here if you need any further help

Number of words: 1352
Breakdowns of tasks
Web browser Security and Vulnerability Assessment
Introduction
Question 1
Question 2
Question 3
Question 4
Number of pages:
References

Movahedi, Y., Cukier, M., Andongabo, A., & Gashi, I. (2019). Cluster-based vulnerability
assessment of operating systems and web browsers. Computing, 101(2), 139-160.
Shrivastava, A., Choudhary, S., & Kumar, A. (2016, October). XSS vulnerability assessment
and prevention in web application. In 2016 2nd International Conference on Next
Generation Computing Technologies (NGCT) (pp. 850-853). IEEE.
Weisman, O. (2016). U.S. Patent No. 9,264,443. Washington, DC: U.S. Patent and
Trademark Office.
APA


Report: Web browser Security and Vulnerability Assessment

Web browser Security and
Vulnerability Assessment
by HAL

General metrics
8,642

1,351

76

5 min 24 sec

10 min 23 sec

characters

words

sentences

reading
time

speaking
time

Score

Writing Issues

99

4

Issues left

4
Critical

Advanced

This text scores better than 99%
of all texts checked by Grammarly

Plagiarism
3
%

5

sources

3% of your text matches 5 sources on the web
or in archives of academic publications

Report was generated on Saturday, Mar 28, 2020, 03:26 PM

Page 1 of 9

Report: Web browser Security and Vulnerability Assessment

Writing Issues
4

Clarity

4

Passive voice misuse

Unique Words

27%

Measures vocabulary diversity by calculating the
percentage of words used only once in your
document

unique words

Rare Words

39%

Measures depth of vocabulary by identifying words
that are not among the 5,000 most common English
words.

rare words

Word Length

5.2

Measures average word length

characters per word

Sentence Length

17.8

Measures average sentence length

words per sentence

Report was generated on Saturday, Mar 28, 2020, 03:26 PM

Page 2 of 9

Report: Web browser Security and Vulnerability Assessment

Web browser Security and
Vulnerability Assessment
WEB BROWSER SECURITY AND VULNERABILITY ASSESSMENT 6
5

Running Head: WEB BROWSER SECURITY AND VULNERABILITY ASSESSMENT 1

Web browser Security and Vulnerability Assessment
Name:
Institutional Af liation:
Date:
Web browser Security and Vulnerability Assessment
Introduction
When it comes to the prevention of security breaches in a web setting, it is
essential to consider the implementation of the most effective and reliable
measures that a company should take. For example, it is possible to reduce the
risks of an attack by considering strategies such as the implementation of antiphishing systems within a given computer network. Sometimes, the users
within a given company may not have suf cient knowledge of the potentially
6

Report was generated on Saturday, Mar 28, 2020, 03:26 PM

Page 3 of 9

Report: Web browser Security and Vulnerability Assessment

malicious links which are presented over the internet. In such a case, it is easy
to click on a malicious link leading to a potential attack against the given
systems and underlying information. Sometimes, these links contain harmful
les which auto-download and install within a given system leading to further
attacks on the underlying data and systems. Therefore, it is essential to create
a reliable approach for reducing the chances of users from clicking onto these
5

links hence causing more information security damages within a given system.
There are various measures that a company can take to ensure that it creates a
reliable approach for reducing the risks of cyber-attacks in the workplace.
Question 1
There are various ways that a company can minimize the chances of users from
clicking on malicious links on the web when navigating the multiple websites.
Sometimes, it is easy for employees to follow links which have been set up by
potential attackers in a given area of application. Therefore, it is essential to
educate the users on the best ways to scrutinize the content and origin of each
link before following them. For instance, the employees need to look out for
connections with attachments. In the case of emails, attackers may use links
with accessories which in turn may lead to the downloading of malicious
software such as adware or spyware. Also, checking the origin of ...

strongboss5 (4958)
UC Berkeley

Anonymous
Top quality work from this tutor! I’ll be back!

Anonymous
Heard about Studypool for a while and finally tried it. Glad I did caus this was really helpful.

Anonymous
Thank you! Reasonably priced given the quality

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4