Skip to Main Content
An Ethical Guide to Cyber Anonymity
book

An Ethical Guide to Cyber Anonymity

by Kushantha Gunawardana
December 2022
Beginner to intermediate content levelBeginner to intermediate
322 pages
8h 46m
English
Packt Publishing
Content preview from An Ethical Guide to Cyber Anonymity

6

Artifacts that Attackers Can Collect from You

Traditionally, IT security and cyber security professionals concentrated on protecting the perimeter. The perimeter is the area in our infrastructure that separates the internal infrastructure from the external world. This practice is commonly known as castle security. It was used by conventional security systems to try to protect information from external perpetrators. Most systems were closed systems and the only connectivity to the external world was the internet; this practice was quite acceptable for traditional systems. However, today’s complex requirements and the introduction of cloud systems have made this practice worthless. Also, insiders play an active role in many attacks, meaning ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cybersecurity and Privacy Law Handbook

Cybersecurity and Privacy Law Handbook

Walter Rocchi
Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition

Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition

Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims

Publisher Resources

ISBN: 9781801810210