Grin logo
en de es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - IT-Security

Backdoor Add-ons. A new way to harbor the data

Title: Backdoor Add-ons. A new way to harbor the data

Textbook , 2014 , 10 Pages , Grade: 1

Autor:in: Hemant Kumar Saini (Author)

Computer Science - IT-Security
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

Today in the growing era of communication everyone wants to update with the new functionality so that they would survive with the best. Since the only way to access Internet is the browser, so it is vital to configure them securely. With the growing demands to ease the work in one click many engine tools, supportive plug-ins have been developed for web-browser. And the users also without knowing its causes quickly installed such extensible plug-ins in their browsers which gives the chances to intruders to get control their computer without their knowledge. Such plug-ins becomes victim for the vulnerabilities of the computer which are due to the manufacturer coding fault.

Excerpt


Inhaltsverzeichnis (Table of Contents)

  • Introduction
  • Deep Understanding the malicious Add-ons
  • Case Study with Chrome Extensions
  • Secure over malicious Add-ons
  • Concluding Remarks
  • References

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This document explores the security risks posed by malicious browser add-ons. It aims to shed light on how these add-ons can compromise user privacy and data security, and to provide insights into how to mitigate these risks.

  • The rise of malicious browser add-ons
  • Vulnerabilities in browser extension design and implementation
  • Methods used by attackers to exploit add-ons for malicious purposes
  • Strategies for securing against malicious add-ons

Zusammenfassung der Kapitel (Chapter Summaries)

The document begins by introducing the concept of browser add-ons and their potential security risks. It then delves into the inner workings of malicious add-ons, explaining how they can be used to steal sensitive data and compromise user privacy. The third chapter examines the specific case of Chrome extensions, highlighting examples of their vulnerabilities and the potential for exploitation. The fourth chapter provides recommendations for securing against malicious add-ons.

Schlüsselwörter (Keywords)

This document focuses on the following key terms and concepts: browser extensions, malicious add-ons, cybersecurity, data privacy, security vulnerabilities, Chrome extensions, Firefox extensions, LastPass, Application Programming Interface (API), malware.

Excerpt out of 10 pages  - scroll top

Details

Title
Backdoor Add-ons. A new way to harbor the data
College
-
Grade
1
Author
Hemant Kumar Saini (Author)
Publication Year
2014
Pages
10
Catalog Number
V283433
ISBN (eBook)
9783656832256
ISBN (Book)
9783656829249
Language
English
Tags
backdoor add-ons
Product Safety
GRIN Publishing GmbH
Quote paper
Hemant Kumar Saini (Author), 2014, Backdoor Add-ons. A new way to harbor the data, Munich, GRIN Verlag, https://www.grin.com/document/283433
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • https://cdn.openpublishing.com/images/brand/1/preview_popup_advertising.jpg
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  10  pages
Grin logo
  • Grin.com
  • Payment & Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint