Computer Science
Grade 9
20 min
Safe Browsing Practices
Safe Browsing Practices
Tutorial Preview
1
Introduction & Learning Objectives
Learning Objectives
Analyze a URL's structure to identify potential phishing attempts.
Differentiate between HTTP and HTTPS and explain the role of SSL/TLS certificates.
Configure advanced browser settings to block third-party trackers and manage cookies.
Explain the function of a VPN and identify scenarios for its use, such as on public Wi-Fi.
Identify the risks associated with browser extensions and evaluate their requested permissions.
Describe the concept of a digital footprint and list strategies to minimize it.
You get an urgent email from your bank with a link to 'verify your account'. How can you tell if that link is a digital friend or a foe in disguise? 🕵️♀️
Beyond just using strong passwords, true online safety means understanding how the web work...
2
Key Concepts & Vocabulary
TermDefinitionExample
HTTPS (Hypertext Transfer Protocol Secure)The secure version of HTTP, the protocol over which data is sent between your browser and the website you are connected to. HTTPS encrypts the data, so it cannot be read by attackers who might be snooping on the network.When you log into your school portal, the URL starts with `https://`. The 's' and the padlock icon in the address bar indicate your password is encrypted during transmission.
SSL/TLS CertificateA digital 'ID card' for a website that verifies its identity and enables an encrypted connection. It's what makes the 'S' in HTTPS possible.Your browser checks the SSL/TLS certificate from `google.com` to ensure you're connected to the real Google and not an imposter site.
VPN (Vi...
3
Core Syntax & Patterns
The URL Analysis Pattern
Deconstruct URLs from left to right: `Protocol://Subdomain.Domain.TopLevelDomain/Path?Parameters`
Use this pattern to verify a link before clicking. The most important part is the `Domain.TopLevelDomain` (e.g., `google.com`), as this is the true owner of the address. Subdomains and paths can be faked to look legitimate.
The Principle of Least Privilege (for Browser Extensions)
Grant an extension only the permissions it absolutely needs to function. `if (extension.requests('read_all_history') && extension.is('simple_calculator')) { deny_permission(); }`
Before installing a browser extension, always review the permissions it requests. A simple theme extension shouldn't need to read all data on all websites. If the permi...
4 more steps in this tutorial
Sign up free to access the complete tutorial with worked examples and practice.
Sign Up Free to ContinueSample Practice Questions
Challenging
You are at the library using their public Wi-Fi and need to check your bank balance. Based on the tutorial's concepts, what is the most secure sequence of actions to take?
A.Open an Incognito window, go to the bank's site, and log in.
B.Connect to a trusted VPN, then navigate to the bank's HTTPS site and verify the URL before logging in.
C.Type the bank's URL, check for the HTTPS padlock, and then connect to a VPN before entering your password.
D.Ask the librarian if the Wi-Fi is secure, and if they say yes, proceed to log in normally.
Challenging
A friend urgently messages you a link: `http://secure.paypal.com.confirm-payment.info/`. What combination of red flags, based on the tutorial, makes this link extremely dangerous?
A.It uses HTTP, and the true domain is 'confirm-payment.info'.
B.It uses the word 'secure' in the subdomain and has a long path.
C.It does not start with 'www' and the Top-Level Domain is '.info'.
D.It uses HTTP, and the domain name contains too many dots.
Challenging
You find a browser extension that promises to change the color scheme of your favorite social media site. During installation, it requests permissions to 'Read your browsing history' and 'Manage your downloads'. How should you apply the 'Principle of Least Privilege'?
A.Approve the permissions, as they might be needed for future features.
B.Approve only 'Read your browsing history' and deny 'Manage your downloads'.
C.Deny the installation entirely because the requested permissions are excessive for its stated function.
D.Install the extension and then try to disable the permissions in the browser settings later.
Want to practice and check your answers?
Sign up to access all questions with instant feedback, explanations, and progress tracking.
Start Practicing Free