Skip to Content
An Ethical Guide to Cyber Anonymity
book

An Ethical Guide to Cyber Anonymity

by Kushantha Gunawardana
December 2022
Beginner to intermediate
322 pages
8h 46m
English
Packt Publishing
Content preview from An Ethical Guide to Cyber Anonymity

6

Artifacts that Attackers Can Collect from You

Traditionally, IT security and cyber security professionals concentrated on protecting the perimeter. The perimeter is the area in our infrastructure that separates the internal infrastructure from the external world. This practice is commonly known as castle security. It was used by conventional security systems to try to protect information from external perpetrators. Most systems were closed systems and the only connectivity to the external world was the internet; this practice was quite acceptable for traditional systems. However, today’s complex requirements and the introduction of cloud systems have made this practice worthless. Also, insiders play an active role in many attacks, meaning ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Ransomware and Cyber Extortion: Response and Prevention

Ransomware and Cyber Extortion: Response and Prevention

Sherri Davidoff, Matt Durrin, Karen Sprenger

Publisher Resources

ISBN: 9781801810210