Skip to Content
An Ethical Guide to Cyber Anonymity
book

An Ethical Guide to Cyber Anonymity

by Kushantha Gunawardana
December 2022
Beginner to intermediate
322 pages
8h 46m
English
Packt Publishing
Content preview from An Ethical Guide to Cyber Anonymity

4

Techniques that Attackers Use to Compromise Privacy

Newer technologies are introduced frequently, and our lifestyles constantly move us closer to cyberspace. Our relationship with the internet is getting stronger while exposing us more to the unregulated internet. A little over two decades ago, the only way we connected to the internet was through emails. We had dial-up connections, which prevented us from creating a stronger relationship with the internet due to the slow speed and time-based connectivity. When faster broadband connections were introduced, we started forming stronger relationships with cyberspace due to speedy and stable connectivity, irrespective of the time we stayed connected.

In the dial-up days, we connected to the internet ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Ransomware and Cyber Extortion: Response and Prevention

Ransomware and Cyber Extortion: Response and Prevention

Sherri Davidoff, Matt Durrin, Karen Sprenger

Publisher Resources

ISBN: 9781801810210