Information Assurance Club Collin Donaldson. What is it? World Wide Web content that is not part of the Surface Web and is indexed by search engines.

Slides:



Advertisements
Similar presentations
Basic Internet Terms Digital Design. Arpanet The first Internet prototype created in 1965 by the Department of Defense.
Advertisements

Library Portals. Selected press articles Covers & blur Reviews Digital music service Co-operation & integration CONTENTSYSTEMS Library Automation Indexing.
Muny Choeun. Welcome to the clouds Clusty.com will take you to Yippy.com, Yippy is a good and helpful site that helps you multi-task while browsing, if.
What is the invisible web?  All information that cannot be indexed using general web search engines  Also known as the deep internet, deepnet, or the.
Dark net . . Invisible Web . . Hidden Web . .
Exploring the Deep Web Brunvand, Amy, Kate Holvoet, Peter Kraus, and David Morrison. "Exploring the Deep Web." PPT--Download University of Utah.
Resources. Overview Problem Report WebCT Faculty & Student Support Searching.
What’s the Difference? Groups or Pages?. What are Groups and Pages? Facebook Groups are pages that you create within the Facebook.
SEO PACKAGES. Types of Plans Starter Plan Business Plan Enterprises Plan.
WEB SCIENCE: SEARCHING THE WEB. Basic Terms Search engine Software that finds information on the Internet or World Wide Web Web crawler An automated program.
 Search engines are programs that search documents for specified keywords and returns a list of the documents where the keywords were found.  A search.
The Further Mathematics network
Web Marketing Strategy DCU Sports Development Service.
Helping your family to stay in control Living with technology.
Viruses.
A brief walkthrough the world of the internet.  TCP/IP stands for Transmission Control Protocol/Internet Protocol  TCP/IP is the standard for transmitting.
HOW SEARCH ENGINE WORKS. Aasim Bashir.. What is a Search Engine? Search engine: It is a website dedicated to search other websites and there contents.
CS621 : Seminar-2008 DEEP WEB Shubhangi Agrawal ( )‏ Jayalekshmy S. Nair ( )‏
Digital Media Dr. Jim Rowan ITEC The Internet your computer DHCP: your browser (Safari)(client) webpages and other stuff yahoo.com (server)
OFF Page SEO Tips & Tricks Step By Step By IT Team of SlideLearn.com.
IT security By Tilly Gerlack.
Searching the Internet CSCI-N 100 Department of Computer and Information Science.
Click here to continue. By: Allan Joe * What is the Internet? What is the Internet? * Who owns the Internet? Who owns the Internet? * How do you connect.
Make It Easy For e-Buyers to Contact You Toll-free phone numbers Call centers Text messaging Instant chat 1.
HTML ~ Web Design.
Objective Understand concepts used to web-based digital media. Course Weight : 5%
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Intro To The Internet A Guide to Getting Started.
The Bits Bazaar Vast amounts of information scattered across the world. Access within reach of millions of people without editors. Search engines provide.
Web Searching. How does a search engine work? It does NOT search the Web (when you make a query) It contains a database with info on numerous Web sites.
The Challenges of Technology Internet Safety. Basic philosophy Messenger services Web sites Social networking sites Monitoring.
McLean HIGHER COMPUTER NETWORKING Lesson 7 Search engines Description of search engine methods.
Internet Censorship Alex Lipp. The Bills in Congress PIPA — the Senate bill originally called the Protect IP Act. SOPA — the Stop Online Piracy Act —
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Presentation by: Jennifer Collins Roldan Padilla.
Helping your family to stay in control Living with technology.
© 2010 Deep Web Technologies, Inc. Taking the Library Back from Google Abe Lederman, President and CTO Deep Web Technologies May 12, 2010.
Uncovering the Invisible Web. Back in the day… Students used to research using resources hand-picked by librarians and teachers. These materials were.
Digital Literacy Concepts and basic vocabulary. Digital Literacy Knowledge, skills, and behaviors used in digital devices (computers, tablets, smartphones)
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Web Systems & Technologies Lecture 1
Optimizing today's websites using tomorrow's technologies.
The Internet. Internet O Internet is a worldwide system of CPU networks where network connecting millions of computers.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
By Jessica Parkinson. Mobile phones have allowed our generation to connect with others all over the world. However, the potential threats are numerous,
Databases vs the Internet. QUESTION: What is the main difference between using library databases and search engines? ANSWER: Databases are NOT the Internet.
Welcome to Good Reading Online (GRO). Part 2 of this tutorial will show you how to use some of the additional options within GRO, such as printing and.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Web 2.0 – A New Beginning Web 2.0, a phrase coined by O'Reilly Media in 2004 refers to a supposed second generation of Internet-based services— such.
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
Goals Be able to identify the parts of a URL Determine the safeness of a link Know the best places to find the info you need Know how to deal with toolbars.
Website Update and Use of Official accounts Dr.Lasantha Ranwala ( MBBS,MSc-Biomedical Informatics) Medical Officer - Health Informatics RDHS Office.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
Internet and Database Searching for Social Issues Joseph M. Compese Library Granada Hills Charter high School.
Keeping Safe Online A Guide for Parents. Quality & Improvement Service nyASSIST Data for children in the Craven area % of Year 6 pupils have their.
Glencoe Introduction to Multimedia Chapter 2 Multimedia Online 1 Internet A huge network that connects computers all over the world. Show Definition.
Internet Marketing Agency – Website Design and SEO Company
Internet Acceptable Use Policy
Browsing and Searching the Web
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Web page a hypertext document connected to the World Wide Web.
Navigating the Internet
Call AVG Antivirus Support | Fix Your PC
Exercise ?: TOR.
Database Driven Websites
The dark web By Riley. Sampare.
The Internet: Encryption & Public Keys
How does the deep web work?
Networks, Legal and Ethical Behaviors BSU CS4MS - 4/9/19
Presentation transcript:

Information Assurance Club Collin Donaldson

What is it? World Wide Web content that is not part of the Surface Web and is indexed by search engines. Most content that is not readily accessible using standard means (i.e. search engines ). For example, web pages regarding private user accounts are in the deep web (Private Info). The Deep Web is the majority of online content, estimated to be times larger than the surface web.

Surface Web vs. Deep Web Surface Web Deep Web Entries are statically generated Linked Content (web crawled) Readily accessible through any browser or search engine unlike the Deep Web, which requires special search engines, browsers, and proxies to access. Entries are dynamically generated (submitted to a query or accessed via form). Unlinked Content Contextual Web Private Web Scripted Content Non-HTML content Limited Access Content (anti- robot protocols like CAPTCHA)

Level 1- The Surface Web The web that the vast majority of internet users are accustomed to. Accessible in any nation that does not block internet access, even places like China and Egypt. Social media sites like Facebook, informational websites like Wikipedia, general websites, etc.

Level 2-The Bergie Web The layer of the Surface Web that is blocked in some nations. Some other information is only accessible through illegal means. Google locked results Recently web crawled old content Pirated Media Pornography

Level 3-The Deep Web Requires a proxy or two (namely Tor) to access. Contains most of the archived web pages of the 1990s Web that did not renew their domain names and such. Government/Business/Collegiate Research. Hackers/Script Kiddies/Virus Information. Illegal and Obscene Content (CP, Gore, Suicides, etc.)

Level 4- The Charter Web Like the Regular Deep Web, but harder to get into and more illegal content. Advanced covert government research. Most of the internet black market (run on bitcoins) Human/Arms/Drug/Rare Animal Trafficking. Assassination networks, bounty hunters, illegal game hunting, line of blood locations, etc. More banned obscene content like CP, Gore, etc.

Level 5-Marianas Web Lowest known level of the Deep Web. Named after the Spanish Technician who created it. Extremely difficult to access, users say it is the safest part of the internet due to how private it is. Julian Assange and other top-level Wikileaks members are believed to have access.

Rumored Levels 6-8 Mostly the stuff of conspiracy theorists. Level 6 is a giant firewall meant to prevent people from going any further. Level 7 “The Fog” is where various worldwide power- players jockey for control of PrimArch. Said to be very dangerous, full of viruses and such. Level 8 is called PrimArch and is claimed to be controlled by an extremely powerful AI (possibly running on a quantum computer).

Ethical Uses Some organizations such as BrightPlanet claim the Deep Web has higher quality articles than the surface web (3 to 1 quality ration), and a lot more of them. Deep Web capable search engines like ipl2 and Infomine can be used to find them. Dig deep enough and you will find some interesting information about past and present experiments and research. Assuming you use them ethically, there are hacking/virus creation tutorials and information as well as a large community of hackers and script kiddies to learn from.

How to Access Safely Vertical and Split Searching Proxies (namely Tor) and AV programs. Turn off ALL plug ins before accessing (especially the shady parts). If your computer has a webcam, remove or obstruct it. Stay away from anything that looks remotely criminal or suggestive. Use a safe, private network connection (DO NOT USE THE IUP WIFI)

Additional Resources idx?c=jep;view=text;rgn=main;idno= idx?c=jep;view=text;rgn=main;idno= ion-about-deep-web.html ion-about-deep-web.html marianas-web-and-other-levels marianas-web-and-other-levels