Book Image

An Ethical Guide to Cyber Anonymity

By : Kushantha Gunawardana
Book Image

An Ethical Guide to Cyber Anonymity

By: Kushantha Gunawardana

Overview of this book

As the world becomes more connected through the web, new data collection innovations have opened up more ways to compromise privacy. Your actions on the web are being tracked, information is being stored, and your identity could be stolen. However, there are ways to use the web without risking your privacy. This book will take you on a journey to become invisible and anonymous while using the web. You will start the book by understanding what anonymity is and why it is important. After understanding the objective of cyber anonymity, you will learn to maintain anonymity and perform tasks without disclosing your information. Then, you’ll learn how to configure tools and understand the architectural components of cybereconomy. Finally, you will learn to be safe during intentional and unintentional internet access by taking relevant precautions. By the end of this book, you will be able to work with the internet and internet-connected devices safely by maintaining cyber anonymity.
Table of Contents (16 chapters)
Part 1: The Basics of Privacy and Cyber Anonymity
Part 2: Methods and Artifacts That Attackers and Competitors Can Collect from You
Part 3: Concepts and Maintaining Cyber Anonymity

Social engineering

Social engineering is a type of attack in which attackers target users directly, rather than trying to compromise complex systems. It’s a psychological manipulation of human nature, which involves tricking them into disclosing sensitive information. An attacker first collects information and investigates a target to find out a potential point of entry and weak security procedures in order to launch attacks.

Types of social engineering

There are two types of social engineering: computer- and mobile-based social engineering and human-based social engineering.

Computer- and mobile-based social engineering

There is a range of social engineering attacks based on computers, including the following:

  • Phishing and spear phishing: Phishing is a type of social engineering attack where an attacker sends a malicious link to a cloned website or an email that tricks the user or users to enter sensitive information. If the attack is aimed at a specific...