Introduction to Cyber Anonymity
In the previous chapter we talked about the artifacts that can be collected by an attacker from individuals and companies from devices, networks, and browsers. Not only attackers but also competitors collect information and artifacts from users. We discussed the tools and techniques that attackers use to compromise networks and we discussed how browsers can be used by the attackers to collect information from users in particular.
This chapter we will be focusing on cyber anonymity. The flow of this chapter will be as follows:
- Definition of cyber anonymity
- Privacy and anonymity
- Levels of cyber anonymity
- Best practices to maintain cyber anonymity
- Developing a cyber anonymity mindset