Question

In: Computer Science

Principles, Cyber security: The Deep Web and The Dark Web - A description of a dark...

Principles, Cyber security: The Deep Web and The Dark Web

- A description of a dark net, the Surface Web, the Deep Web and the Dark Web. Are any of these terms synonymous? Do they all exist? What is the purpose of those that truly exist?

need reference or citation for these questions

Solutions

Expert Solution

ANSWER :

ANS 1.

-- Dark net : It is a part of deep web , which usually refers to the website used for the criminal reasons. It works in a hidden way and usually include black market and payment there are made using Bitcoins

-- Surface Web : It is small portion of the world wide web, which is easily available to common people and they access this through search engines. In this usually no secret or criminal activities is done.

-- Deep Web : It is the hidden part of the world wide web that is greater than the surface web. It does not show up in normal search engine. They contain lots of virus and it is dangerous to search there as one can get infected with huge number of viruses.

-- Dark web : They are encrypted content which is not available by normal search engines. It provides access to the illegal activities that can be done while hiding.

-- Synonyms are : Dark web and Dark net.

-- They all exist in real also.

-- Purpose of :

1. Dark net -

- It is used to share illegal files and documents.

- In this people shares illegal goods and services.

- Sometimes the confidential and stolen account details is also shared.

2. Surface web -

- It is used to search the data and things we want.

- This is the one that is readily available and it is the world wide web we usually see i.e. normal search engine.

3. Deep web -

- The purpose of this is mainly all the illegal activities and it is very huge .

- Mostly illicit activities are done here like buying or selling drugs, sharing confidential stolen data or accessing black market.

4. Dark web -

- It is a part of deep web that is small in size and is usually here one can run business anonymously.

- Also illegal activities are carried out in this dark web.


Related Solutions

Cyber Security. Dark Web.................................. What is the supposed origin of the Dark Web? What does your...
Cyber Security. Dark Web.................................. What is the supposed origin of the Dark Web? What does your team think about whether it is needed/not needed? Important/not important? A security risk/not a risk? Any security implications? Please, need reference or citation!
Describe how one supposedly gains access to information on the Dark Web and Deep Web. Describe...
Describe how one supposedly gains access to information on the Dark Web and Deep Web. Describe Onion Routing and how it applies to the Dark Web. need reference or citation!
From the security aspect of client/browser, connecting to a secure web site/server, From the cyber security...
From the security aspect of client/browser, connecting to a secure web site/server, From the cyber security perspective, what browser features should be examined for valid certificates. What are the risks of using expired web certificates
A cyber security engineer is installing a WAF to protect the company's website from malicious web...
A cyber security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective? A. A reverse proxy B. A decryption certificate C. A split-tunnel VPN D. Load-balanced servers     A cyber security consultant was asked to revise the security baselines that are utilized by a large organization. Although the company provides different platforms for its staff, including desktops, laptops, and mobile devices, the...
Many cyber security attacks are made possible due to common weaknesses in software. The Open Web...
Many cyber security attacks are made possible due to common weaknesses in software. The Open Web Application Security Project (OWASP) publishes information to assist in the development of secure application software. Every few years OWASP publish their Top 10 Application Security Risks, along with guidance to prevent and mitigate these common development errors. Your task is as follows: 1. Browse the OWASP Top 10 web site and read the summary page for each of the top 10 application security vulnerabilities...
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial...
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial encryption algorithms. Find one that you feel may be “snake oil”. Write a report explaining the encryption algorithm and your opinion *in-text citations and references are required *written in at least 2~3 paragraphs
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how...
Prompt: You will submit your creation of a cyber-security policy. The cyber-security policy will assess how the organization will interpret security issues that occur in the workplace. The cyber-security policy will also distinguish and examine ethical issues in the workplace that pertain to social media, email, and privacy. Compose an organizational security policy that protects the confidentiality , integrity , and availability of EQUIFAX DATA BREACH IN 2017 Original Question : Prompt: You will submit your creation of a cyber-security...
Cyber security is an essential tool for managing risks in today’s increasingly dynamic and capable cyber...
Cyber security is an essential tool for managing risks in today’s increasingly dynamic and capable cyber threat landscape. Yet the market for cyber security remains small, and organizations are making only tactical investments in cyber security measures—one of the reasons why there has been an increase in cyber-attacks. Evidence suggests that this trend will last for some time to come. However, the anticipation of an increasingly open and mobile enterprise should help refocus the spotlight on strategic investments in areas...
(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the...
(cyber security ) What is the difference between Cyber Espionage and Nation State Hacking? Explain the differences with the help of appropriate examples. Please provide your own words. No copy from the internet. 150 to 200 words.
Discuss Cyber Security as it relates to the role of the US government. Discuss Cyber Security as it relates to the responsibilities of the individuals who are involved in creating the technology.
(a) – Discuss Cyber Security as it relates to the role of the US government. (b)– Discuss Cyber Security as it relates to the responsibilities of the individuals who are involved in creating the technology.  
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT