Skip to Content
An Ethical Guide to Cyber Anonymity
book

An Ethical Guide to Cyber Anonymity

by Kushantha Gunawardana
December 2022
Beginner to intermediate
322 pages
8h 46m
English
Packt Publishing
Content preview from An Ethical Guide to Cyber Anonymity

8

Understanding the Scope of Access

In the previous chapter, we discussed the levels of cyber anonymity, as well as how to develop a mindset and best practices to maintain cyber anonymity. This chapter provides information on how to set up cyber anonymity and requirements to maintain cyber anonymity under the following topics:

  • Understanding the scope of access
  • Planning for connectivity
  • Understanding the level of access
  • Preparing the device
  • Preparing applications for anonymity

Understanding the scope of access

In the cyber world, the most used way of providing access to services is through an identity system. We discussed different types of identity systems in previous chapters. There are centralized and decentralized identity systems. Some ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Ransomware and Cyber Extortion: Response and Prevention

Ransomware and Cyber Extortion: Response and Prevention

Sherri Davidoff, Matt Durrin, Karen Sprenger

Publisher Resources

ISBN: 9781801810210