Table of Contents

Preface

Part 1: The Basics of Privacy and Cyber Anonymity

1

Understanding Sensitive Information

The categorization of information

Different forms of sensitive information

Raw data can create sensitive information

Privacy in cyberspace

Cyber anonymity

Summary

2

Ways That Attackers Use Your Data

Impersonation and identity theft

Technical, procedural, and physical access

Technical controls

Access controls

Discretionary access control

Mandatory access control

Role-based access control

Procedural controls

Physical controls

Creating vulnerabilities to compromise systems

Vulnerable system

Exploit for the recovered vulnerability

The motivation of the attacker

Creating vulnerabilities

Increase the attack surface using sensitive data

Creating entry points and bots

Zombies and botnets

Summary

Part 2: Methods and Artifacts That Attackers and Competitors Can Collect from You

3

Ways That Attackers Reveal the Privacy of Individuals and Companies

Cyber exposure index

WHOIS records

Everything exposed in cyberspace matters

Exposing an email address

We don’t need to enter our real information always

Facts we shouldn’t be disclosing

Remove personnel information from WHOIS

Image meta data

Disposed devices

Unsecured cameras

Social media matters

Concerns on social media

Risks involved with social media

Solutions for the risks introduced by social media

Spot potential scams on social media

Summary

4

Techniques that Attackers Use to Compromise Privacy

Information gathering

Passive information gathering

Active information gathering

Enumeration

Identity exposure

Online password cracking

Offline password cracking

Artifacts that can be collected from devices

Social engineering

Types of social engineering

Tools used by attackers to launch social engineering attacks

Preventing social engineering attacks

Summary

5

Tools and Techniques That Attackers Use

Maltego

Google Advanced Search and dorks

Dorks

Google Advanced Search

Reverse Image Search

Uvrx Social Search

Uvrx File Search

Uvrx Social Search

Uvrx Health Search

Open Wi-Fi networks

What is open Wi-Fi?

Risks involved with open Wi-Fi

How to minimize the risks with open Wi-Fi

Phishing sites

Summary

6

Artifacts that Attackers Can Collect from You

Artifacts that attackers can collect from you

Artifacts that competitors would like to collect

Direct web tracking cookies

Third-party tracking cookies

What can tracking cookies do?

How to handle cookies

The Brave browser

Devices can be compromised

Ways that an attacker can access your networks

Cloned session

Compromising browsers

Summary

Part 3: Concepts and Maintaining Cyber Anonymity

7

Introduction to Cyber Anonymity

Definition of cyber anonymity

Privacy and anonymity

What is privacy?

What is anonymity?

Levels of cyber anonymity

Beyond Level 1 and Level 0

Super-anonymous level

Best practices to maintain cyber anonymity

Developing a cyber anonymity mindset

Summary

8

Understanding the Scope of Access

Understanding the scope of access

Planning for connectivity

Types of connections

How to secure a home network

Configuring a strong Wi-Fi password

Device configurations to make it secure

Understanding the level of access

Preparing the device

Virtual machines

Using live boot versions

How you can improve privacy and anonymity on Windows 10

How you can improve privacy and anonymity on your Android or iPhone

Preparing applications for anonymity

How to block app tracking on Android devices

How to block app tracking by iOS devices

Summary

9

Avoiding Behavior Tracking Applications and Browsers

Avoiding behavior-tracking applications and browsers

Browser extensions

Anti-tracking software

Using secure messaging apps

Encryption

Using disposable emails and contact numbers

Burner phone

Virtual numbers

Using virtual machines and virtual applications

Portable applications

Virtual desktop and applications

Summary

10

Proxy Chains and Anonymizers

What proxy chains and anonymizers are (for example, Tor)

Anonymizers

Free proxy servers

Proxy chains

Censorship circumvention (Psiphon)

Live OS (for example, Tails)

Tails

Qubes OS

VPN solutions

Logless services

The Whonix OS

Summary

Index

Other Books You May Enjoy

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.142.141.220