Skip to Content
An Ethical Guide to Cyber Anonymity
book

An Ethical Guide to Cyber Anonymity

by Kushantha Gunawardana
December 2022
Beginner to intermediate
322 pages
8h 46m
English
Packt Publishing
Content preview from An Ethical Guide to Cyber Anonymity

7

Introduction to Cyber Anonymity

In the previous chapter we talked about the artifacts that can be collected by an attacker from individuals and companies from devices, networks, and browsers. Not only attackers but also competitors collect information and artifacts from users. We discussed the tools and techniques that attackers use to compromise networks and we discussed how browsers can be used by the attackers to collect information from users in particular.

This chapter we will be focusing on cyber anonymity. The flow of this chapter will be as follows:

  • Definition of cyber anonymity
  • Privacy and anonymity
  • Levels of cyber anonymity
  • Best practices to maintain cyber anonymity
  • Developing a cyber anonymity mindset

Definition of cyber anonymity ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Ransomware and Cyber Extortion: Response and Prevention

Ransomware and Cyber Extortion: Response and Prevention

Sherri Davidoff, Matt Durrin, Karen Sprenger

Publisher Resources

ISBN: 9781801810210