University of Bahrain
Scientific Journals

Enterprise-level Hardening of Web Browsers for Microsoft Windows

Show simple item record

dc.contributor.author A. Jillepalli, Ananth
dc.contributor.author Conte de Leon, Daniel
dc.contributor.author T. Sheldon, Frederick
dc.contributor.author A. Haney, Michael
dc.date.accessioned 2018-08-16T09:09:58Z
dc.date.available 2018-08-16T09:09:58Z
dc.date.issued 2018-09-01
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/3209
dc.description.abstract Today, web browsers are a major avenue for cyber-compromise and data breaches. Web browser hardening, through high-granularity and tailored configurations, can help prevent or mitigate many of these attack avenues. For example, an enforced configuration that allows users to use one browser to connect to critical and trusted websites and a different browser for untrusted websites, with the former web browser restricted to trusted sites and the latter with JavaScript and Plugins disabled by default, can help prevent JavaScript- and Plugin-based attacks. However, most organizations today, still allow web browsers to run with their default configurations and allow users to use the same web browser to connect to trusted and untrusted websites alike. In this tutorial article, we describe in detail the steps needed for hardening the enterprise browser ecosystem using such tailored and high-granularity hardening approach at the enterprise scale by using the Windows Group Policy Editor and Active Directory Services, which are in widespread use in most organizations. We hope that system administrators use this guide to jump-start an enterprise-wide strategy for implementing high-granularity application-level hardening. This will help secure enterprise systems at the client-side, in addition to the network perimeter and server-side. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International *
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/4.0/ *
dc.subject Application hardening en_US
dc.subject Application-level least privilege en_US
dc.subject Phishing prevention en_US
dc.subject Secure configurations en_US
dc.subject Security policy en_US
dc.subject Web browser security en_US
dc.title Enterprise-level Hardening of Web Browsers for Microsoft Windows en_US
dc.type Article en_US
dc.identifier.doi http://dx.doi.org/10.12785/ijcds/070501
dc.volume 07 en_US
dc.issue 05 en_US
dc.pagestart 261 en_US
dc.pageend 274 en_US
dc.contributor.authoraffiliation Center for Secure and Dependable Systems en_US
dc.contributor.authoraffiliation Department of Computer Science, University of Idaho, Moscow, Idaho, United States en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

The following license files are associated with this item:

This item appears in the following Issue(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 International Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International

All Journals


Advanced Search

Browse

Administrator Account