Swinburne INF10009: Darknet Introduction, Benefits, and Risks

Verified

Added on  2023/06/10

|12
|534
|138
Presentation
AI Summary
This presentation provides an introduction to the darknet, covering its origins, resources, benefits, and associated risks. The presentation delves into the historical context of the darknet, tracing its terminology back to the 1970s and highlighting its emergence in the mid-2000s. It outlines the resources required to access the darknet, including VPNs, TOR, and specific browsers. The presentation explores the benefits, such as hidden search results and enhanced privacy, while also acknowledging potential risks, including law enforcement issues and illegal activities. Furthermore, it discusses necessary precautions and potential future applications, such as improved information gathering and the evolution of the TOR project. The presentation concludes by emphasizing the importance of proper licensing and responsible usage of the darknet, recommending the use of onion servers for access. The presentation also includes a bibliography of relevant sources.
Document Page
DARKNET
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTRODUCTION
Darknet is said to contain dark web. Darknet
expands to a world wide web which contains
information with the help of overlay network.
Access to darknet is done with the help of
internet which can be dine with the help of
specific software. Specialized authorization is
required for accessing dark web.
.
Document Page
ORIGIN
Dark web terminology was first termed in the
year 1970.
It first came into publicity in the year 2005
Dark net terminology was termed the same in the
year 2015
Document Page
RESOURCES
Global VPN + TOR + CLOUD
Onion Browser
Orbot porxy with TOR
Freenet
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BENEFITS
Hidden Search Result
Staying Safe
Safe from spiders
Access to hidden layers
Document Page
RISKS
Law Enforcement
Copyright issues
Conflictive issues
Illegal information promotion
Document Page
PRECAUTION
Precautions that must be taken in order to stay
protected are as follows: -
1. License authentication
2. Conflict protection
3. Data management
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
FUTURE APPLICATION
Proper and complete information
TOR project evolution
End of net neutrality
Document Page
CONCLUSION
Despite all the issues that are present in dark net, usage
of dark net can also be done in a more efficient way to
gather information regarding important topics. Onion
server is preferred for accessing dark net. It is also
recommended to access dark net only after proper
licensing.
Document Page
Weimann, G., 2016. Terrorist migration to the dark
web. Perspectives on Terrorism, 10(3), pp.40-44.
Gehl, R.W., 2017. Is the Dark Web Legit? The Case of
Dark Web Search Engines. AoIR Selected Papers of
Internet Research, 6.
Martellini, M. and Rao, J., 2017. Designing Systems for
Terroristic Indicators Analysis Based on Visible, Social
and Dark Web Data Sources. The Risk of Skilled Scientist
Radicalization and Emerging Biological Warfare
Threats, 138, p.82.
BIBLIOGRAPHY
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Roberts, D.L. and Hernandez-Castro, J., 2017. Bycatch
and illegal wildlife trade on the dark web. Oryx, 51(3),
pp.393-394.
Zhang, X. and Chow, K.P., 2018. A Framework for Dark
Web Threat Intelligence Analysis. International Journal
of Digital Crime and Forensics (IJDCF), 10(4), pp.108-
117.
Vogt, S.D., 2017. The Digital Underworld: Combating
Crime on the Dark Web in the Modern Era. Santa Clara J.
Int'l L., 15, p.104.
Document Page
Hurlburt, G., 2017. Shining Light on the Dark Web. IEEE
Computer, 50(4), pp.100-105.
Pace, J., 2017. Exchange relations on the dark
web. Critical Studies in Media Communication, 34(1),
pp.1-13.
Finklea, K.M., 2015. Dark web.
Sinha, S., 2017. Dark Web and Tor. In Beginning Ethical
Hacking with Python (pp. 173-177). Apress, Berkeley,
CA.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]