logo

Information Security Assignment (pdf)

12 Pages3554 Words71 Views
   

Added on  2021-04-21

Information Security Assignment (pdf)

   Added on 2021-04-21

ShareRelated Documents
Running head: IT SECURITYIT SECURITYName of the StudentName of the UniversityAuthor Note
Information Security Assignment (pdf)_1
IT SECURITY2Table of ContentsIntroduction................................................................................................................................3Background................................................................................................................................3Statistics of Deep Web...........................................................................................................4Concept of information security relating to Deep web..........................................................5Security challenges posed by Deep Web...................................................................................5Potential solutions......................................................................................................................7Future trends...............................................................................................................................8Conclusion..................................................................................................................................9References................................................................................................................................11
Information Security Assignment (pdf)_2
IT SECURITY3IntroductionThe deep web, which is also known as the invisible web, can be stated as a part of theinternet, which is not accessible to search engines over the concept of the internet. Thecontent, which are included into the deep web, may include chat messages; email message,social media files, electronic health record (EHRs). This content can be directly be accessiblein the internet but are not crawled and indexed within the search engine like Yahoo, Google,DuckDuckGo and Bing. On the other hand, it can be stated that the security, which isapplicable to the cyber world, also plays a very vital role. Deep web can be considered as oneof the places where illegal activity are easily performed without any interference from thethird party or user. The main aspect, which is involved into the working of the deep web, isthat using the Deep web is not an illegal activity but the benefit or the service, which isobtained from, should be legal. Tor is one of the most well known portals of the Deep Web. Itcan be used in the way of providing a virtual pathway that allows the user to communicateand navigate anonymously over the concept of the internet. The main aim of the report is to take into consideration the different concepts, whichcan be, applied the aspect of Deep Web. To focus on the topic, major emphasis is put into theworking of the Deep Web. The main security challenges, which are faced with this concept,are discussed putting the focus on the currency, which is used for the exchange of item overthe concept. The role, which the deep web would be playing shortly, is also a point ofconsideration in the report. BackgroundThe concept of the deep web or the deep web existed a long time back since theinvention of the internet was made. The dark web can be referred to as a website, which is ontop of the dark nets. They are a network, which are overlaid that off limits certain
Information Security Assignment (pdf)_3
IT SECURITY4authorisations, software and configuration of the hardware. In conversation, people usuallyuse the term dark web, deep web and shadow web interchangeably (Liu & Xiang, 2016). The term “dark net” was coined in the 1970s, which mainly refers to the network,which is secluded from the ARPANET (the original term, which the user knows as theInternet). The exact focus point in the creation of the deep web was the creation of a privatenetwork scenario where illegal activities can be conducted. The main area, which wasinvolved, was that the user should be kept secured so that no one has the direct access on whois accessing what. One of the examples of the dark net is the Tor. It is a network, which isanonymity, which obscures the actual IP Address of the user. The process is mainly achievedusing bouncing and encrypting the communication, which is made in the network all acrossthe world. It can be stated here that the Tor was very much far from the first dark net whichwas used however recent research have founded out that the students of the StanfordUniversity and MIT were the first one to use the ARPANET to sell cannabis. Therefore, itcan be said that these students were the first one to invent the concept of the “dark web”. Fewof the other example, which can be related to the concept of the dark nets, which are usedtoday, can be the I2p network and the freenet. Statistics of Deep WebIn the section, the main emphasis would be focused on how large is the concept of theDeep Web. The following statistics would be helping in identifying the perspective of thedeep web in detailsThe information, which is, contained in the deep web us almost 7500 Terabytes.Taking into comparison surface net, the deep web contains between 400 to 550 timesmore information. In recent times, more than 200000 deep web sites are currently available.
Information Security Assignment (pdf)_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Dark-Net: The Hidden Side of the Internet
|7
|1982
|419

Dark Web: Technologies, Challenges, and Future Directions
|10
|2528
|238

Assessment of Work and Progress Towards Learning Outcomes
|9
|2156
|186

Dark Web Vs Deep Web: A Comparative Study
|11
|2384
|189

Evaluating Pros and Cons of Dark Net
|11
|3542
|203

Darknet: An Introduction to the World of Overlay Networks
|12
|534
|138