Time
3 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
Hello and welcome to P C Security Intermediate Course.
00:04
In this video, I will be talking about protecting browsing, or what are the methods to protect infection through browsing,
00:13
so risk associating with browsing are well known. You can open the malicious site and infected in fact, your PC or you can download infected files and then run it. So these two things are
00:28
basically what, what the risks that are associated it browsing.
00:33
And there are two approaches to brought in browsing protection so you can have untie Malbert that is, in real time having some
00:42
shields or protections in place of when you browse, it stops you from doing some things that you're not supposed to. So, for example, opening malicious sites there are
00:53
There is, ah, different rate of success. But most of the time over solutions Today they have the way to protect you from opening malicious sites, especially if they are known malicious sites.
01:06
The problem is, if somebody's targeting use and then you spear phishing email, you open the site, and
01:15
it is actually difficult toe protecting these cases. So the other approached this.
01:21
It's the browsing virtualized environment.
01:23
I'm not going to go into detail about this because the other specific solutions and thesis topic requires basically its own course. But if you open your browser in the virtualized environment
01:37
and you actually catch a bug, it stays in this virtual environment. So when you close the virtual machine, which is running your browser,
01:45
any kind of infection is essentially gone. This is providing that your virtual browsing environment is separated from the harbour. So what happens if you want to
01:57
download file from sites from government lifted some kind of FTP site?
02:04
Essentially, this file should be saved in some kind of sandbox or some protected mode in which you are. For example, if it's Excel file,
02:14
you shouldn't be able to view it before your scan it. So that's the whole idea. So you have downloaded file. It sits in your
02:21
PC's hard drive,
02:23
but it's it's being monitored by
02:28
by some kind of software.
02:30
And if you open it so if it's Excel file open in Excel, you are just in view only boat. So you're not ableto edited, which means that any
02:38
code is simply not running your just viewing it. You're not
02:44
actually working with that file, so In order to do it, you have to close exam
02:50
and then scanned a file.
02:53
It's usually if you have some self such software on your PC. It's usually done by simply right clicking on the file and doing some kind off automatic function, which is there in the menu, which appears when you called the right click on the file.
03:08
And after that, that file is no longer in protected environment. It's now fully operational file. It has gone through scanning and then you can open it. This is not 100% foolproof,
03:23
because if you have,
03:24
um, some kind off virus that can bypass the on time over, then it will still not be noticed. And then you you will, you will start it.
03:38
Um, on the other hand, the anti malware a real time protection, as I said, is also vulnerable to the same thing. So if they create a way to bypass it by simply using the Tante Melber to test if their attack is okay,
03:55
so if it passes, then they can launch it. So
03:59
there is no 100% safe usage of files you download from the Internet. But if you're using virtually is the environment. Then you are,
04:11
let's say, almost 100% safe from opening malicious sites, because whatever damage they dio goes when you close the virtual environment.
04:19
Okay, so this was a short lesson and at the end, just a question for you. What is the downside off? Anti Muller browser, Part browser protection.
04:30
Easy that Muller creators may test the new approaches until they succeed using debt on time. Our
04:36
eyes it because it's not efficient. If user has have been writes or is it because of you has only 67% success rate.
04:46
And the correct answer is, of course, Muller Creators may use that sometime Albert to test their in your approach years until they succeed.
04:55
So in this video, you have learned about risk associated with browsing and two approaches to protecting it. Next lesson will be about the recap of the whole section. That or module we have just finished, which is about protecting programs

Up Next

Intermediate PC Security

The Intermediate PC Security course will teach students about endpoint protection. Students will learn fundamental information about PC Security and common attack vectors.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor