The dark web By Riley. Sampare.

Slides:



Advertisements
Similar presentations
Dark net . . Invisible Web . . Hidden Web . .
Advertisements

8 Mistakes That Expose You to Online Fraud to Online Fraud.
Netiquette Rules.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 Facebook  Twitter  MySpace  Windows LiveSpace.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
1. Go to 2. Complete the requested information.
CCT355H5 F Presentation: Phishing November Jennifer Li.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Pignose VPN Service By: Arshama Dehghan, Jeanine Brown, and Joshua Ensinia.
Internet Safety Cameron, Emily, Grahm, and Audrey.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Information Assurance Club Collin Donaldson. What is it? World Wide Web content that is not part of the Surface Web and is indexed by search engines.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
Hiding in the Dark: The Internet You Cannot See Marc Visnick
O nline R eputation. Paris Brown She was 17 She was 17 From Kent From Kent She was Britain’s first youth crime commissioner She was Britain’s first.
Don McClain Real Estate Marketing Ideas Guaranteed To Close More Sales EZ House Buyers.
Digital Footprints By Erik Borge September 29, 2015.
Here // This is the presentation about to describe categories of Hackers. //In this session you will learn aims, identity and purposes of hackers >>> Enter.
Online Reputation A guide for children aged 7+
Internet Safety.
Information Systems Design and Development
Website Reliability Standard 1 Objective 3c: Evaluate the results of web searches and the reliability of information found on the Internet.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Social Network.
The Internet is For Everyone
What they are and how to protect against them
E-Safety.
How you know what you’re doing is working… or not working.
Evaluating and Summarizing Sources
Intellectual Property Owner’s Manual
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
The Cloud September 10, 2016.
We celebrate 26/11 every year as the CITIZEN ACTION PLEDGE DAY
Overview 1. Phishing Scams
6 Internet Safety Tips By: Aaron
How to build a good reputation online
make sure you have signed in to this training.
Importance of Privacy Internet Safety
How to Use Members Area of The Ninety-Nines Website
Uppingham Community College
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Exercise ?: TOR.
Search engine questions
Safety in the Digital World
GDPR General Data Protection Regulation EU: Coming May 25, 2018
By: Jonathan Cardwell, Mark Fredricks, Ryan Vina and Jake Leiper
Do you know all of these apps?
TECA 2018.
Facebook and Browser Safety
Digital Footprint By. Abby Christensen.
Don’t Get Scammed on Your Way to College and Avoiding Identity Theft
Sr. Manager, Global Talent Acquisition
Online safety, social manners, and digital footprint
My Digital Footprint.
Santa’s s By……..
Internet Basics Videos
2.8.2 Being Online Being smart online
CYBERSAFETY & Personal information
My Digital Footprint….
How does the deep web work?
2.8.2 Being Online Being smart online
Affiliate Slide Show Guide to the Unique Selling Points
Employee Cybersecurity Program
Networks, Legal and Ethical Behaviors BSU CS4MS - 4/9/19
Presentation transcript:

The dark web By Riley. Sampare

What is the type of media? The dark web is basically a storage for all the posts and websites google deletes. It holds at least 96% of content on the web (estimated). So you start off on the surface web which consist of yahoo, google, Bing, Reddit, CNN, etc. Then you go into the deep web which consists of academic database, medical records, financial records, some scientific reports, etc. and now you’ve reached rock bottom, the dark web. The dark web the place for drug trafficking, political protests, and other illegal activities.

Who invented it? These three men have stayed anonymous It was originally implemented and designed by the United States Defense Advanced Research Projects Agency. It was first developed by Paul Syversin, mike Reed, and David Goldshack. They were mathematicians that worked at the naval research laboratory. These three men have stayed anonymous

When did they invent it? These three began working on something called the “onion router” in 1995. Their research soon developed into The Onion Router project, better known as Tor, in 1997. They used Tor for the dark web to stay anonymous.

Why do people use it? For what purpose? The main reason people go to the dark web is because there looking for big drugs such as coke, heroin, meth, etc. you can also watch live streams on the dark web. But you have to be crazy in the head to watch them. The live streams you can watch on the dark web consist of murder, torture, rape, etc. And if you’re having some big problems in your life right now you can hire hitman to kill people for you. You have to be careful on the dark web though. Because you can get hacked at any time so you’ll need a strong VPN (Virtual private network). This basically protects your whole computer from viruses and people trying to hack you. One of the best VPNs is express VPN. Of course you do have to buy a member ship. The prices are 1month/12.95 6month/9.99 and 12months/6.67

How does it work. How do people use it How does it work? How do people use it? Create step by step instructions for someone new to use this form of media. The dark web is basically a whole new search engine. You can go on a certain websites and click a link that brings you to a place to start up the dark web. You make sure you have your VPN on before you click the link. And you might want to change your address. After you’ve done all your security checks for your computer. You can go ahead and brown the dark web.

What are the positive and negative aspects of this media type? The negatives can go on and on. you can buy guns, drugs, hitmen, etc etc. you can see things such as murder, child pornography, people torturing other people, etc. if you don’t set up your security properly your ip address can get hacked. You have to buy anything in bitcoin because if you pay with your bank card, your bank account can get accessed by anyone. The only positive about the dark web is you can buy literally anything.

Explain why this is a new form of media and how it is different from traditional media. This is a new form of media because its nothing old. The dark web as been out for a few years yes, but its not very old. Its different from traditional media because it brings a whole new way of communicating to each other. And unlike the traditional black market. This black market has everything you could ask for. Of course this is a bad type of media to be on if you don’t know what your doing.