Question

In: Computer Science

Cyber Security. Dark Web.................................. What is the supposed origin of the Dark Web? What does your...

Cyber Security. Dark Web..................................

What is the supposed origin of the Dark Web? What does your team think about whether it is needed/not needed? Important/not important? A security risk/not a risk? Any security implications?

Please, need reference or citation!

Solutions

Expert Solution

Solution 1: Dark Web is generally that part of the internet which is not generally visible to the normal internet user who's using the normal web browser to use the internet. It is said that 90% of the internet is actually not accessible to the users and this part of the internet is known as the deep web. The creation of the dark web was carried out by the US government as an infrastructure to allow spies to exchange information among them anonymously. During the mid-90s, the federal US government actually developed The Onion Router for the purpose of the same, and then later they actually released to the normal public to use.

Solution 2: See, it can be efficiently used for accessing the information that is not accessible using the normal browser. Therefore, it is really handy when you need to do research about some topic but you literally cannot access it over the normal web or due to the restrictions imposed by the regime. So yeah, it can be important in situations and it is highly subjective.

Solution 3: Yes, there are significant cybersecurity risks associated with the usage and access of the deep web. It is a safe haven for the traders of illegal stuff such as drugs, weapons, restricted software, and hacking tools and hackers can be found there in abundance. So if you are accessing the dark web you are actually exposing yourself to a vast ocean of cybercriminals as well as the stuff that may cause permanent harm to your system and can even result in your prosecution by the cybersecurity law enforcement agencies in some country. This is the reason why it is always a risk associated woth the usage of deep web.

Here's the solution to your question and it is absolutely correct, please please please provide it a 100% rating. Thanks for asking and happy learning!!


Related Solutions

Principles, Cyber security: The Deep Web and The Dark Web - A description of a dark...
Principles, Cyber security: The Deep Web and The Dark Web - A description of a dark net, the Surface Web, the Deep Web and the Dark Web. Are any of these terms synonymous? Do they all exist? What is the purpose of those that truly exist? need reference or citation for these questions
From the security aspect of client/browser, connecting to a secure web site/server, From the cyber security...
From the security aspect of client/browser, connecting to a secure web site/server, From the cyber security perspective, what browser features should be examined for valid certificates. What are the risks of using expired web certificates
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how...
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how the organization will interpret security issues that occur in the workplace. The cyber-security policy will also distinguish and examine ethical issues in the workplace that pertain to social media, email, and privacy. Compose an organizational security policy that protects the confidentiality , integrity , and availability of EQUIFAX DATA BREACH IN 2017 Original Question : Prompt: You will submit your creation of a cyber-security...
A cyber security engineer is installing a WAF to protect the company's website from malicious web...
A cyber security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective? A. A reverse proxy B. A decryption certificate C. A split-tunnel VPN D. Load-balanced servers     A cyber security consultant was asked to revise the security baselines that are utilized by a large organization. Although the company provides different platforms for its staff, including desktops, laptops, and mobile devices, the...
Many cyber security attacks are made possible due to common weaknesses in software. The Open Web...
Many cyber security attacks are made possible due to common weaknesses in software. The Open Web Application Security Project (OWASP) publishes information to assist in the development of secure application software. Every few years OWASP publish their Top 10 Application Security Risks, along with guidance to prevent and mitigate these common development errors. Your task is as follows: 1. Browse the OWASP Top 10 web site and read the summary page for each of the top 10 application security vulnerabilities...
(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the...
(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the differences with the help of appropriate examples. Please provide your own words. No copy from the internet. 150 to 200 words.
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial...
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial encryption algorithms. Find one that you feel may be “snake oil”. Write a report explaining the encryption algorithm and your opinion *in-text citations and references are required *written in at least 2~3 paragraphs
(Cyber security) What are your tips for protecting yourself against identity theft? Provide relevant examples to...
(Cyber security) What are your tips for protecting yourself against identity theft? Provide relevant examples to support your suggestions? Please provide your own words. No copy from the internet. 150 to 200 words.
If you consider the cyber security responsibilities and obligations associated with your role or a role...
If you consider the cyber security responsibilities and obligations associated with your role or a role in which you have an interest, what are the cyber security responsibilities? To what extent do they relate in some way to databases?
Tell of a cyber-security breach: What company, what happened, and what was the outcome? What are...
Tell of a cyber-security breach: What company, what happened, and what was the outcome? What are your thoughts about this security breach?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT