Dr. Erdal Ozkaya
Search
  • Home
  • Cybersecurity
  • Introduction to Cybersecurity and Dark Web (Part 2)

Introduction to Cybersecurity and Dark Web (Part 2)

Introduction to Cybersecurity and Dark Web
Erdal2021-06-28T17:46:53-04:00

Introduction to Cybersecurity and Dark Web (Part 2)

Table of Contents

    • Introduction to Cybersecurity and Dark Web (Part 2)
  • Web and Its Levels
  • Web Levels
  • Web Categories
  • The Implication of the Dark Web Crime
  • To read part 1 :
This is Part 2, to read part 1 : https://www.erdalozkaya.com/introduction-to-cybersecurity-and-dark-web-part-1/

Web and Its Levels

The term dark web is part of the WWW and known as invisible/hidden web. The content on the dark web remains hidden and cannot be searched through conventional search engines. The content only exists on personal encrypted networks or peer-to-peer configurations, and it is not indexed by typical search engines. Therefore, the large part of the internet that is inaccessible to conventional search engines is known as deep web (invisible web). Everyone who uses the web virtually visits what could be reflected as deep websites on a daily basis without being aware.

The deep web is the anonymous internet where it is much difficult for hackers, spies, or government agencies to track internet users and have a look on which websites they are using and what they are doing there.

Web Levels

There are various levels of deep web; for instance, the lower level (level 1) is generally comprised of the “open to public” part of the web, and the upper level (called level 5) is known as dark web which is not accessible by normal web browser and needs to get The Onion Router (Tor) network or some other private network. The following table gives a brief understanding of the level of dark web:

Level 1 Common web
Level 2 Surface Web Reddit Digg Temp email services
Level 3 Bergie Web Google locked results Honey ports Freehive, Bunny Tube, etc.
Level 4 Charter Web Hacking Groups Shelling Networking AI theorist Banned videos, books, etc.
Level 5 Onion sites Human trafficking, bounty hunters, rare animal trade Questionable materials Exploits, black markets, drugs
 

Web Categories

This section describes the three different levels of web such as the public web, the deep web, and the dark web.

Public web: It typically refers to the unencrypted or non-dark net. This traditional WWW has relatively low-base anonymity, with most websites routinely identifying users by their IP address.

Deep web: It refers to internet content that is not part of the surface web. This means that instead of being able to search for places, you have to visit those directly. They’re waiting if you have an address, but there aren’t directions to get there. The internet is too large for search engines to cover completely; thus, deep web is largely present. The deep web generally mentions the web pages which are invisible by traditional search engine.

Dark web: It is part of the WWW and part of the deep web which can only be accessible by specific software, configurations, or authorization, often using nonstandard communication protocols and ports. The Onion Router is used to access the dark website which is called Tor network.

The following figure shows the differences between deep web, dark web, and internet.

Dark Net

The term dark net is part of dark deep web, and it is a collection of networks and technologies used to share digital content. The dark net is hidden from the users who use to surf with normal or standard browser, and it is also hiding the web address and server locations. The following table shows the difference between surface web, deep web, dark web, and dark net.

  Surface Web Deep Web Dark Web Dark Net
Description Content that search engine can find Content that search engine cannot find Content that is hidden intentionally –
Known as Visible web, indexed web, indexable web, lightnet Invisible web, hidden web, deep net – Underbelly of internet
Constitutes Web Web Web Network
Contents Legal Legal + illegal Illegal Illegal
Information Found 4% 96% – –
Browser Google Chrome, Mozilla Firefox, Opera, etc. – Tor Browser Freenet, Tor, GNUnet, I2P, OneSwarm, RetroShare

The Implication of the Dark Web Crime

Security in the dark web is crucial for building confidence and security in the use of information technologies so as to ensure trust by the information society. Lack of security in cyberspace undermines confidence in the information society. This is especially the case with many intrusions around the globe resulting in the stealing of money; assets; and sensitive military, commercial, and economic information. With information flowing through boundaries of different legal systems connected to different networks around the globe, there is a growing need to protect personal information, funds, and assets, as well as national security. As a result, cybersecurity is gaining interest by both the public as well as the private sectors.

With the emerging applications of computers and IT, cybercrime has become a significant challenge all over the world. Thousands of cybercriminals attempt every day to attack against computer systems to illegally access them through the internet. Hundreds of new computer viruses and spam are released every month in an attempt to damage computer systems or steal or destroy their data. Such threats are expensive, not only in terms of quantity but also in terms of quality.

In recent years, experts are becoming more concerned about protecting computer and communication systems from growing cyberattacks including deliberate attempts to access the computer systems by unauthorized persons with the goal of stealing crucial data; to make illegal financial transfers; to disrupt, damage, or manipulate data; or execute any other unlawful actions.

As computer security has advanced, maintaining network persistence has grown harder. As per the Australian Cyber Security Centre (ACSC) report (ACSC, 2017, p. 28), the culture has adapted to this environment, focusing on low-risk, high-reward targets to achieve their goals, with a focus on the development of social engineering methodologies to implement new attacks.

Furth

Inside The Dark Web Dr Ozkaya
Inside The Dark Web Dr Ozkaya

er to this, the ubiquitous nature of the internet has allowed these nefarious individuals to gain increasingly detailed profiles of individuals through exploitation and analysis of their digital footprints. This has resulted in higher rates of spear-phishing attacks, identity theft and fraud, and the development of highly specialized malware tools.

There are many risks and pitfalls in cybersecurity incident that can seriously affect computer and network systems. It can be due to improper cybersecurity controls, man-made or natural disasters, or malicious users. The following section mentions some major incidents in the cyberspace.

Best Seller book in Amazon : https://www.erdalozkaya.com/inside-the-dark-web-best-seller-in-amazon/

CRC Press : https://www.crcpress.com/Inside-the-Dark-Web/Ozkaya-Islam/p/book/9780367236229

Target : https://intl.target.com/p/inside-the-dark-web-by-erdal-ozkaya-rafiqul-islam-paperback/-/A-76551768

Amazon : https://www.amazon.com/Inside-Dark-Web-Erdal-Ozkaya-ebook/dp/B07RXLHRF3/

My Books : https://www.erdalozkaya.com/about-erdal-ozkaya/my-books/

To read part 1 :

Introduction to Cybersecurity and Dark Web (Part 1)

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

Hacking Windows with BackTrack

Hacking Windows with BackTrack – Highly Effective Meth0d

Hacking Windows with BackTrack  A presentation on how Windows 7 can be hacked via the Free Back Track   Hacking Windows with BackTrack... read more
Defense Against Terrorism NATO Erdal Ozkaya

Defense Against Terrorism -18

 Defense Against Terrorism by NATO  2018 has started great , my research journal has been published at the  North Atlantic Treaty... read more

Getting hacked by color

Getting hacked by color A hacking anatomy and what we can learn out of it! There is nearly no single week... read more
Trusted Security Advisor Community

Trusted Security Advisor Community –

Trusted Security Advisor Community I am really excited to announce the "Xcitium Zero Dwell Trusted Security Advisor" community. This community came... read more
Manage Engine review

A review of Cybersecurity The Beginner’s Guide : Informative Review (March 22 )

A review of Cybersecurity The Beginner's Guide Special thanks to Manage Engine for revieing my book and publishing it in their... read more
Cryptolocker and Incident Response Bir Saldırının Anatomisi: Cryptolocker

Cryptolocker and Incident Response – Free Webinar 3/6/21 :

Cryptolocker and Incident Response This webinar will be hosted by Turkeys biggest IT Community Cozum Park in Turkish Bir Saldırının Anatomisi:... read more

The Move Towards a Digital, Sustainable, and Resilient Future – Free VIDE0

The Move Towards a Digital, Sustainable, and Resilient Future  The Annual Investment Meeting  organized by the Ministry of Economy, UAE, which... read more
Robust Cloud Security Posture WatchDog Erdal Ozkaya

Robust Cloud Security Posture Management regime

Robust Cloud Security Posture A cyber strategy is a documented approach to handling various aspects of cyberspace. It is mostly... read more

Security and Privacy In Communication Network New Book :

Security and Privacy In Communication Network I am proud to announce an Academic book which I have contributed as researcher /... read more
Titans Talk Show Erdal Ozkaya

The Titans Talk Show now in You Tube -watch f0r free

The Titans Talk Show "If you FEAR Change, Information Security is not your filed" The Titans Talk Show ,In Season 3,... read more

Categories

  • About Dr Erdal Ozkaya (300)
    • Awards (97)
    • Erdal in the news (121)
    • Feedback (88)
    • My Books (53)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (305)
  • Artificial Intelligence AI (11)
  • Certification (52)
  • Cloud Computing (73)
  • Cybersecurity (325)
  • Cybersecurity Leadership (58)
  • Digital Transformation (2)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (166)
  • General (138)
  • How to …? (61)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (32)
    • Free E-Books (14)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Siber Güvenlik (17)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Sabri Kızmaz on Finans Sektörü Odaklı Siber Tatbikat
  • celal bayar on Finans Sektörü Odaklı Siber Tatbikat
  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.