Home Page Icon
Home Page
Table of Contents for
An Ethical Guide to Cyber Anonymity
Close
An Ethical Guide to Cyber Anonymity
by Kushantha Gunawardana
An Ethical Guide to Cyber Anonymity
An Ethical Guide to Cyber Anonymity
Contributors
About the author
About the reviewer
Preface
Part 1: The Basics of Privacy and Cyber Anonymity
Chapter 1: Understanding Sensitive Information
Chapter 2: Ways That Attackers Use Your Data
Part 2: Methods and Artifacts That Attackers and Competitors Can Collect from You
Chapter 3: Ways That Attackers Reveal the Privacy of Individuals and Companies
Chapter 4: Techniques that Attackers Use to Compromise Privacy
Chapter 5: Tools and Techniques That Attackers Use
Chapter 6: Artifacts that Attackers Can Collect from You
Part 3: Concepts and Maintaining Cyber Anonymity
Chapter 7: Introduction to Cyber Anonymity
Chapter 8: Understanding the Scope of Access
Chapter 9: Avoiding Behavior Tracking Applications and Browsers
Chapter 10: Proxy Chains and Anonymizers
Index
Other Books You May Enjoy
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
An Ethical Guide to Cyber Anonymity
Next
Next Chapter
Preface
Table of Contents
Preface
Part 1: The Basics of Privacy and Cyber Anonymity
1
Understanding Sensitive Information
The categorization of information
Different forms of sensitive information
Raw data can create sensitive information
Privacy in cyberspace
Cyber anonymity
Summary
2
Ways That Attackers Use Your Data
Impersonation and identity theft
Technical, procedural, and physical access
Technical controls
Access controls
Discretionary access control
Mandatory access control
Role-based access control
Procedural controls
Physical controls
Creating vulnerabilities to compromise systems
Vulnerable system
Exploit for the recovered vulnerability
The motivation of the attacker
Creating vulnerabilities
Increase the attack surface using sensitive data
Creating entry points and bots
Zombies and botnets
Summary
Part 2: Methods and Artifacts That Attackers and Competitors Can Collect from You
3
Ways That Attackers Reveal the Privacy of Individuals and Companies
Cyber exposure index
WHOIS records
Everything exposed in cyberspace matters
Exposing an email address
We don’t need to enter our real information always
Facts we shouldn’t be disclosing
Remove personnel information from WHOIS
Image meta data
Disposed devices
Unsecured cameras
Social media matters
Concerns on social media
Risks involved with social media
Solutions for the risks introduced by social media
Spot potential scams on social media
Summary
4
Techniques that Attackers Use to Compromise Privacy
Information gathering
Passive information gathering
Active information gathering
Enumeration
Identity exposure
Online password cracking
Offline password cracking
Artifacts that can be collected from devices
Social engineering
Types of social engineering
Tools used by attackers to launch social engineering attacks
Preventing social engineering attacks
Summary
5
Tools and Techniques That Attackers Use
Maltego
Google Advanced Search and dorks
Dorks
Google Advanced Search
Reverse Image Search
Uvrx Social Search
Uvrx File Search
Uvrx Social Search
Uvrx Health Search
Open Wi-Fi networks
What is open Wi-Fi?
Risks involved with open Wi-Fi
How to minimize the risks with open Wi-Fi
Phishing sites
Summary
6
Artifacts that Attackers Can Collect from You
Artifacts that attackers can collect from you
Artifacts that competitors would like to collect
Direct web tracking cookies
Third-party tracking cookies
What can tracking cookies do?
How to handle cookies
The Brave browser
Devices can be compromised
Ways that an attacker can access your networks
Cloned session
Compromising browsers
Summary
Part 3: Concepts and Maintaining Cyber Anonymity
7
Introduction to Cyber Anonymity
Definition of cyber anonymity
Privacy and anonymity
What is privacy?
What is anonymity?
Levels of cyber anonymity
Beyond Level 1 and Level 0
Super-anonymous level
Best practices to maintain cyber anonymity
Developing a cyber anonymity mindset
Summary
8
Understanding the Scope of Access
Understanding the scope of access
Planning for connectivity
Types of connections
How to secure a home network
Configuring a strong Wi-Fi password
Device configurations to make it secure
Understanding the level of access
Preparing the device
Virtual machines
Using live boot versions
How you can improve privacy and anonymity on Windows 10
How you can improve privacy and anonymity on your Android or iPhone
Preparing applications for anonymity
How to block app tracking on Android devices
How to block app tracking by iOS devices
Summary
9
Avoiding Behavior Tracking Applications and Browsers
Avoiding behavior-tracking applications and browsers
Browser extensions
Anti-tracking software
Using secure messaging apps
Encryption
Using disposable emails and contact numbers
Burner phone
Virtual numbers
Using virtual machines and virtual applications
Portable applications
Virtual desktop and applications
Summary
10
Proxy Chains and Anonymizers
What proxy chains and anonymizers are (for example, Tor)
Anonymizers
Free proxy servers
Proxy chains
Censorship circumvention (Psiphon)
Live OS (for example, Tails)
Tails
Qubes OS
VPN solutions
Logless services
The Whonix OS
Summary
Index
Other Books You May Enjoy
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset