logo

Assignment on IT Secuirty (pdf)

9 Pages3078 Words209 Views
   

Added on  2021-06-17

Assignment on IT Secuirty (pdf)

   Added on 2021-06-17

ShareRelated Documents
IT SECURITYContents
Assignment on IT Secuirty (pdf)_1
1INTRODUCTION.................................................................................................................................2Background...........................................................................................................................................2Security challenges posed by Deep web............................................................................................3Potential solutions.................................................................................................................................4Future trends..........................................................................................................................................6CONCLUSION.....................................................................................................................................6REFERENCES......................................................................................................................................7
Assignment on IT Secuirty (pdf)_2
2INTRODUCTIONIn the modern day, internet has expanded its reach into the lives of the people. But the webthat is accessed by anyone is only a very small part of the internet and it is known as surfaceweb. The major part is covered by deep web, hidden web or invisible web content of which isnot indexed by standard web search engines (Li, Dong, Lyons, Meng & Srivastava, 2012).The content of this web is hidden behind HTTP forms and involves many common uses likeonline banking, web mail and services that users must pay for and the thing that is protectedby a paywall. For example video on demand, some online newspaper and magazines andmany more are the part of deep web. According to estimation, the size of the deep web is 500times greater than surface web as well as 90% of the overall internet. Due to increasingactivities of hackers, this deep web is under many security threats and hence it is utilised formaking an attacks. This report revolves around the security challenges posed around the deepweb as well as the potential solutions available in this case. It also gives the future trendsrelated with the deep web.BackgroundResearch suggests that it is literally impossible to find the number of pages that are active onthe deep web at once. This is the web that acts as a playground for law enforcement officers,hackers and other mischievous elements on internet. New technologies like anonymizationbrowser software and encryption have empowered other users to see deep if they areinterested (Balakrishnan & Kambhampati, 2011). The contents of deep web are under thesurface but are still accessible to appropriate software. Most common example of it is onlinebanking. Many hackers have become active stealing the data that is present on the surface web and it isdone with the use of deep web. This has become easier with the use of tools like Tor. It isbasically a service developed by United States Naval Research Laboratory (Tripwire, 2017).It is basically a web browser like Google but just to access the contents that is running on thedark web. The activities that are challenging the cyber security has increased because thenumbers of users who want to surpass the local restriction have increased in order to haveaccess of the movies or some other thing that is not available in the local area. This isgenerally used by the hacker for making fake passport, taking access of any system and manymore things.
Assignment on IT Secuirty (pdf)_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assessment of Work and Progress Towards Learning Outcomes
|9
|2156
|186

CO4515 - Trends in Cybercrime
|10
|2226
|183

Cyber Crime - Pros and Cons of Dark Net
|9
|3265
|11

Information Security Assignment (pdf)
|12
|3554
|71

Web Based System Security: Types of Testing, Methodologies, Results and Solutions
|14
|3944
|345

Online Banking Threats: Study, Trends, Impacts and Recommendations
|8
|2086
|302