7
Introduction to Cyber Anonymity
In the previous chapter we talked about the artifacts that can be collected by an attacker from individuals and companies from devices, networks, and browsers. Not only attackers but also competitors collect information and artifacts from users. We discussed the tools and techniques that attackers use to compromise networks and we discussed how browsers can be used by the attackers to collect information from users in particular.
This chapter we will be focusing on cyber anonymity. The flow of this chapter will be as follows:
- Definition of cyber anonymity
- Privacy and anonymity
- Levels of cyber anonymity
- Best practices to maintain cyber anonymity
- Developing a cyber anonymity mindset
Definition of cyber anonymity ...
Get An Ethical Guide to Cyber Anonymity now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.