Book Image

An Ethical Guide to Cyber Anonymity

By : Kushantha Gunawardana
Book Image

An Ethical Guide to Cyber Anonymity

By: Kushantha Gunawardana

Overview of this book

As the world becomes more connected through the web, new data collection innovations have opened up more ways to compromise privacy. Your actions on the web are being tracked, information is being stored, and your identity could be stolen. However, there are ways to use the web without risking your privacy. This book will take you on a journey to become invisible and anonymous while using the web. You will start the book by understanding what anonymity is and why it is important. After understanding the objective of cyber anonymity, you will learn to maintain anonymity and perform tasks without disclosing your information. Then, you’ll learn how to configure tools and understand the architectural components of cybereconomy. Finally, you will learn to be safe during intentional and unintentional internet access by taking relevant precautions. By the end of this book, you will be able to work with the internet and internet-connected devices safely by maintaining cyber anonymity.
Table of Contents (16 chapters)
Part 1: The Basics of Privacy and Cyber Anonymity
Part 2: Methods and Artifacts That Attackers and Competitors Can Collect from You
Part 3: Concepts and Maintaining Cyber Anonymity

What this book covers

Chapter 1, Understanding Sensitive Information, will provide you with an understanding of sensitive information and what privacy and cyber anonymity are – this is the introductory chapter for the book.

Chapter 2, Ways That Attackers Use Your Data, will explain why attackers are interested in your privacy and the ways that attackers use stolen data after data breaches. Often, attackers use stolen data to commit more crimes or as entry points to attack other companies.

Chapter 3, Ways That Attackers Reveal the Privacy of Individuals and Companies, will detail how attackers reveal the privacy of individuals and companies.

Chapter 4, Techniques that Attackers Use to Compromise Privacy, will describe what types of techniques attackers will use to compromise your privacy.

Chapter 5, Tools and Techniques That Attackers Use, will uncover what different tools attackers use to compromise privacy. This will improve the reader’s knowledge of the different kinds of tools that attackers can use.

Chapter 6, Artifacts that Attackers Can Collect from You, will outline what type of data attackers are interested in collecting from companies and individuals.

Chapter 7, Introduction to Cyber Anonymity, will introduce you to cyber anonymity and cover the basics of the layers of cyber anonymity.

Chapter 8, Understanding the Scope of Access, will provide information on how to set up cyber anonymity and requirements to maintain cyber anonymity.

Chapter 9, Avoiding Behavior Tracking Applications and Browsers, will explain how to maintain cyber anonymity and the areas and techniques that we can use to maintain cyber anonymity.

Chapter 10, Proxy Chains and Anonymizers, will explain the tools and techniques that can be used to maintain cyber anonymity.