0% found this document useful (0 votes)
253 views18 pages

Dark Web: Worked By: Alesia Saku

The dark web allows for anonymous communication but is also used for illegal activities like buying drugs and weapons. It requires special software like Tor to access and protects users' identities through encryption. While the dark web provides privacy for some, it also enables human rights abuses like child exploitation and poses risks like identity theft. Overall it is a small portion of the internet but garners attention due to its illicit uses.

Uploaded by

Alesia Saku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
253 views18 pages

Dark Web: Worked By: Alesia Saku

The dark web allows for anonymous communication but is also used for illegal activities like buying drugs and weapons. It requires special software like Tor to access and protects users' identities through encryption. While the dark web provides privacy for some, it also enables human rights abuses like child exploitation and poses risks like identity theft. Overall it is a small portion of the internet but garners attention due to its illicit uses.

Uploaded by

Alesia Saku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

DARK WEB

WORKED BY: ALESIA SAKU.


SUMMARY
 Definition of dark web.
 How to access it?
 What happens in the dark web?
 Is dark web dangerous?
 The risks of accessing dark web.
 Why is dark web important?
The Web
 a)The surface web-is web
content indexed by search
engines and it is everything
you find in Google search.
 b)The deep web- it contains
material not indexed by
search engines, for example
your Facebook posts, email
inbox, online banking,
Google drive folders etc.
 c)The dark web- the sites that
can not be accessed with
normal browsers such as
Chrome, Firefox and Safari.
More about dark web
 Dark web requires special software or authorization
to access.

 It lives on the darknet, a part of the internet


accessible only to particular browsers or through
specific network configurations.

 Dark web is designed to provide anonymity by


keeping communication private through encryption.
How to access dark web
 The safest way is Tor
network, which is a free,
open-source software for
enabling anonymous
communication.
 For added safety , first
connect to a VPN, then
use Tor.
How to access dark web
 Connect to a reliable and safe VPN.
 Download and install Tor Browser.
 Browse the dark web with Tor website. Tor
will let you access the onion domains of the
dark web.
 Protect your identity. When communicating or
making purchases over the dark web, use
encrypted and anonymous email addresses and
pay with an anonymous cryptocurrency wallet.
Dark web engines
 Surface web search
engines can’t access dark
web, but specialized dark
web search engines can
help like:
 DuckDuckGo
 Not Evil
 Torch
 Haystack
 Ahmia
What happens in the dark web?
 You can buy and sell illegal drugs, malware,
dangerous chemicals and weapons.

 Some hackers sell software exploits that other


cybercriminals can use to infect victims with
malware data and steal personal data.
What happens in the dark web?
 People sell fake services that require upfront
payment and many fraud and scams run
rampant on the dark web.
 Hackers sell access to email accounts, social
media profiles, ids etc.
 People access child abuse images or videos,
they promote terrorism, they torture people etc.
 Human organs and infants are also for sale in
the dark web.
What happens in the dark web
 According to a recent study by Privacy Affairs your data is
worth about $1,010 on the dark web.
 Credit card details with related information cost as little as
$14-$30 in a darknet marketplace. Hackers can sell your online
banking login credentials for about $40. 
How big is dark web?
 The dark web may seem
large, but it’s actually not
very big.
 Researches estimated that
while there are more than
55,000 existing onion
domains, only 8400 of
these sites were active.
 Dark web sites is only
1.5% of the size of the
surface web.
Is dark web illegal?
 Accessing the dark web is not illegal.
 Some uses are perfectly legal and support the
value of the dark web like blogs , forums sites
that cover a host of topics such as politics or
sports.
 Carrying out illegal acts such as selling
weapons, drugs or promoting terrorism and
accessing child abuse images is illegal.
The risks of accessing dark web
 Young people may access
pornography, indecent
images of children or sites
selling drugs or weapons.
 People are also at risk of
exploitation and abuse by
sex offenders.
 You may fall victim to
hackers and give away
personal information
without intention.
Is your data on the dark web?
 If you haven't been following good cybersecurity
practices, there's a good chance that your information
is on sale somewhere on the deep web. But how
would you know for sure? 
  
 Google will inform you of a data leak if you save
your password on the Chrome browser. Or you might
have noticed strange login behavior, data breach
alerts and requests to change your password from
different platforms, and so on.
Dark web stories.
 CNET blogger Dan Patterson found his colleague's
information in dark web where everything from SNN to
addresses was on sale with thousands of others for just
$69. 

 Patterson's exposure was far worse as his information


included his current phone number and more. Neither
Patterson nor his colleague had any idea that their PII was
available on the dark web until they went looking for it.
The importance of the dark web.
 It helps people maintain privacy.
 Privacy is important for many innocent people
terrorized by stalkers and other criminals.
 Dark web monitoring keeps track of an
organisation’s sensitive data on the dark web
which helps organizations limit the damage of
data breach and take necessary action to
protect itself, it’s employees , clients etc.
Bibliography
 https://www.avast.com/c-dark-web#:~:text=Th
e%20dark%20web%20refers%20to,or%20thro
ugh%20specific%20network%20configuration
s
.
 https://www.csoonline.com/article/3249765/wh
at-is-the-dark-web-how-to-access-it-and-what-
youll-find.html
 https://www.kaspersky.com/resource-center/thr
eats/deep-web
Thank you for your attention!

You might also like