際際滷

際際滷Share a Scribd company logo
Dark Web  What it is & How Does
it Work?
 While the name makes us think of dark alleys in dangerous
neighborhoods, the Dark Web is quite simply an anonymous
communications platform on the Internet. And, according to the
Dark Web specialists from Secmon1, it was invented by the US
military as a security exercise.
 This is a perfect example of how technology that was intended
to be used for good (to test if the scenario is possible) can be
turned to the dark side
Introduction
Dark Web What it is & How Does it Work
 The dark web is mostly used for illegal activities such as fraud
(selling credit card details, personal information for identity
theft or company data), drug dealing (check out the Silk Road
story), and more.
 Here, you can also find information stolen from corporations
and organizations (by hackers) and published for anyone to
see. In these scenarios, the hackers consider that the leaked
data should be publicly accessible, as a way to fight for a just
cause or right a wrong.
What its used for?
 The Dark Web as a whole is not that much more different than
the internet we know. However, there are some things that
would throw off a regular user (at least at first).
 For instance, these sites are not indexed by a search engine. In
fact, they do everything possible to avoid this. In addition, the
URL structure is different as all the domain extensions are
replaced with .onion and all the domain names are just a string
of random text.
How Does it Look Like?
 The Dark Web is festering with illegal online activities, but most
of them are left to the proper authorities. However, most
companies that ever went through a data breach, worry that
their data is publicly available somewhere online.
How To Protect Your Interests?
 In short, cybercriminals will get anything they can get their
hands on. This includes all sorts of files (word, excel, pdfs,
accounting files), CRM (Customer Relationship Management)
data, and more.
 A recent example is the Australian Toll breach where personal
employee information, customers, financial information ended
up on the Dark Web.
What Data are Cybercriminals after?
 While there is no one sure way to keep your companys data safe, there are
several steps every company should take to increase protection:
 Know where your sensitive data is stored:
 Is it in the cloud, is it on any computers or servers at the office?
 Reduce your sensitive data footprint:
 Is it easy to manage the security for all the locations of where the sensitive data is
stored?
 Does all the sensitive data need to be accessible, can we archive it and take it
offline in a secure location (e.g put it on an external hard drive and store it in a
safe)?
 Automate the classification of your data
 Ensure sensitive data is classified and stored in safe and secure locations
 Automate remediation of data where it is saved to less controlled parts of your
network
How to Stay Safe
 Apply the Essential 8: Security Recommendations from The
Australian Government to ensure the IT security of your
computers and servers are very strong
 Apply DLP (Data Loss Prevention) in your cloud applications
like Google Workspace or Office 365  this can prevent sensitive
data from incorrectly or maliciously being sent outside the
organization.
Onsite Helpers recommendation to
reduce vulnerability
Contact US
https://onsitehelper.com/

More Related Content

Similar to Dark Web What it is & How Does it Work (18)

Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Michele Chubirka
CyberSecurityAwareness cyber_Awarenesscyber_Awareness.pdf
CyberSecurityAwareness cyber_Awarenesscyber_Awareness.pdfCyberSecurityAwareness cyber_Awarenesscyber_Awareness.pdf
CyberSecurityAwareness cyber_Awarenesscyber_Awareness.pdf
horiamommand
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
Business.com
CyberCrime attacks on Small Businesses
CyberCrime attacks on Small BusinessesCyberCrime attacks on Small Businesses
CyberCrime attacks on Small Businesses
Jose L. Qui単ones-Borrero
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
IT AMC Support Dubai - Techno Edge Systems LLC
Security
SecuritySecurity
Security
Bob Cherry
How To Secure Online Activities
How To Secure Online ActivitiesHow To Secure Online Activities
How To Secure Online Activities
- Mark - Fullbright
Digital Shadows SearchLight Overview
Digital Shadows SearchLight OverviewDigital Shadows SearchLight Overview
Digital Shadows SearchLight Overview
Digital Shadows
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Ben Rothke
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
Jetking
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdfIs It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
IT AMC Support Dubai - Techno Edge Systems LLC
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ranjana Adhikari
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
john6938
IMA Meeting 03222012
IMA Meeting 03222012IMA Meeting 03222012
IMA Meeting 03222012
jerryjustice
Hacking databases
Hacking databasesHacking databases
Hacking databases
sunil kumar
Hacking databases
Hacking databasesHacking databases
Hacking databases
sunil kumar
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
- Mark - Fullbright
Cybersecurity Basics of awareness presentation .pptx
Cybersecurity  Basics of awareness presentation .pptxCybersecurity  Basics of awareness presentation .pptx
Cybersecurity Basics of awareness presentation .pptx
williambillrials
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Michele Chubirka
CyberSecurityAwareness cyber_Awarenesscyber_Awareness.pdf
CyberSecurityAwareness cyber_Awarenesscyber_Awareness.pdfCyberSecurityAwareness cyber_Awarenesscyber_Awareness.pdf
CyberSecurityAwareness cyber_Awarenesscyber_Awareness.pdf
horiamommand
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
Business.com
How To Secure Online Activities
How To Secure Online ActivitiesHow To Secure Online Activities
How To Secure Online Activities
- Mark - Fullbright
Digital Shadows SearchLight Overview
Digital Shadows SearchLight OverviewDigital Shadows SearchLight Overview
Digital Shadows SearchLight Overview
Digital Shadows
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Ben Rothke
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
Jetking
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
john6938
IMA Meeting 03222012
IMA Meeting 03222012IMA Meeting 03222012
IMA Meeting 03222012
jerryjustice
Hacking databases
Hacking databasesHacking databases
Hacking databases
sunil kumar
Hacking databases
Hacking databasesHacking databases
Hacking databases
sunil kumar
Cybersecurity Basics of awareness presentation .pptx
Cybersecurity  Basics of awareness presentation .pptxCybersecurity  Basics of awareness presentation .pptx
Cybersecurity Basics of awareness presentation .pptx
williambillrials

More from Onsite Helper (18)

Comprehensive IT Solutions and Services for Business Optimization
Comprehensive IT Solutions and Services for Business OptimizationComprehensive IT Solutions and Services for Business Optimization
Comprehensive IT Solutions and Services for Business Optimization
Onsite Helper
MANAGED IT SOLUTIONS AND SERVICES FOR YOUR MEDIUM-SIZED BUSINESS
MANAGED IT SOLUTIONS AND SERVICES FOR YOUR MEDIUM-SIZED BUSINESSMANAGED IT SOLUTIONS AND SERVICES FOR YOUR MEDIUM-SIZED BUSINESS
MANAGED IT SOLUTIONS AND SERVICES FOR YOUR MEDIUM-SIZED BUSINESS
Onsite Helper
How to Use Google Workspace to Open Microsoft Office Files
How to Use Google Workspace to Open Microsoft Office FilesHow to Use Google Workspace to Open Microsoft Office Files
How to Use Google Workspace to Open Microsoft Office Files
Onsite Helper
Microsoft Intune vs Google Endpoint Management A Security Showdown
Microsoft Intune vs Google Endpoint Management A Security ShowdownMicrosoft Intune vs Google Endpoint Management A Security Showdown
Microsoft Intune vs Google Endpoint Management A Security Showdown
Onsite Helper
Microsoft Intune vs Google Endpoint Management A Comprehensive Comparison
Microsoft Intune vs Google Endpoint Management A Comprehensive ComparisonMicrosoft Intune vs Google Endpoint Management A Comprehensive Comparison
Microsoft Intune vs Google Endpoint Management A Comprehensive Comparison
Onsite Helper
Discover More About Microsoft Intune vs Google Endpoint Management
Discover More About Microsoft Intune vs Google Endpoint ManagementDiscover More About Microsoft Intune vs Google Endpoint Management
Discover More About Microsoft Intune vs Google Endpoint Management
Onsite Helper
Understanding the Importance of Endpoint Management in Virtual IT Environment...
Understanding the Importance of Endpoint Management in Virtual IT Environment...Understanding the Importance of Endpoint Management in Virtual IT Environment...
Understanding the Importance of Endpoint Management in Virtual IT Environment...
Onsite Helper
Microsoft Intune vs Google Endpoint Management
Microsoft Intune vs Google Endpoint ManagementMicrosoft Intune vs Google Endpoint Management
Microsoft Intune vs Google Endpoint Management
Onsite Helper
7 Steps to Successfully Installing Google Credential Provider for Windows 11
7 Steps to Successfully Installing Google Credential Provider for Windows 117 Steps to Successfully Installing Google Credential Provider for Windows 11
7 Steps to Successfully Installing Google Credential Provider for Windows 11
Onsite Helper
An Insight into Essential Eights Multi-Factor Authentication
An Insight into Essential Eights Multi-Factor AuthenticationAn Insight into Essential Eights Multi-Factor Authentication
An Insight into Essential Eights Multi-Factor Authentication
Onsite Helper
Understanding Essential 8 Maturity Models and How to Pick the Right One
Understanding Essential 8 Maturity Models and How to Pick the Right OneUnderstanding Essential 8 Maturity Models and How to Pick the Right One
Understanding Essential 8 Maturity Models and How to Pick the Right One
Onsite Helper
Explore and Apply Managed IT Services Australia in Your Business
Explore and Apply Managed IT Services Australia in Your BusinessExplore and Apply Managed IT Services Australia in Your Business
Explore and Apply Managed IT Services Australia in Your Business
Onsite Helper
Keep your medium-sized business assets safe and secure with our range of mana...
Keep your medium-sized business assets safe and secure with our range of mana...Keep your medium-sized business assets safe and secure with our range of mana...
Keep your medium-sized business assets safe and secure with our range of mana...
Onsite Helper
Step-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity FrameworkStep-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity Framework
Onsite Helper
What is BIMI & Why Do You Need It for Your Business
What is BIMI & Why Do You Need It for Your BusinessWhat is BIMI & Why Do You Need It for Your Business
What is BIMI & Why Do You Need It for Your Business
Onsite Helper
Google Credential Provider for Windows: What it is and why you need it
Google Credential Provider for Windows: What it is and why you need it Google Credential Provider for Windows: What it is and why you need it
Google Credential Provider for Windows: What it is and why you need it
Onsite Helper
Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...
Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...
Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...
Onsite Helper
Understanding Compliance Options for IT Security.pdf
Understanding Compliance Options for IT Security.pdfUnderstanding Compliance Options for IT Security.pdf
Understanding Compliance Options for IT Security.pdf
Onsite Helper
Comprehensive IT Solutions and Services for Business Optimization
Comprehensive IT Solutions and Services for Business OptimizationComprehensive IT Solutions and Services for Business Optimization
Comprehensive IT Solutions and Services for Business Optimization
Onsite Helper
MANAGED IT SOLUTIONS AND SERVICES FOR YOUR MEDIUM-SIZED BUSINESS
MANAGED IT SOLUTIONS AND SERVICES FOR YOUR MEDIUM-SIZED BUSINESSMANAGED IT SOLUTIONS AND SERVICES FOR YOUR MEDIUM-SIZED BUSINESS
MANAGED IT SOLUTIONS AND SERVICES FOR YOUR MEDIUM-SIZED BUSINESS
Onsite Helper
How to Use Google Workspace to Open Microsoft Office Files
How to Use Google Workspace to Open Microsoft Office FilesHow to Use Google Workspace to Open Microsoft Office Files
How to Use Google Workspace to Open Microsoft Office Files
Onsite Helper
Microsoft Intune vs Google Endpoint Management A Security Showdown
Microsoft Intune vs Google Endpoint Management A Security ShowdownMicrosoft Intune vs Google Endpoint Management A Security Showdown
Microsoft Intune vs Google Endpoint Management A Security Showdown
Onsite Helper
Microsoft Intune vs Google Endpoint Management A Comprehensive Comparison
Microsoft Intune vs Google Endpoint Management A Comprehensive ComparisonMicrosoft Intune vs Google Endpoint Management A Comprehensive Comparison
Microsoft Intune vs Google Endpoint Management A Comprehensive Comparison
Onsite Helper
Discover More About Microsoft Intune vs Google Endpoint Management
Discover More About Microsoft Intune vs Google Endpoint ManagementDiscover More About Microsoft Intune vs Google Endpoint Management
Discover More About Microsoft Intune vs Google Endpoint Management
Onsite Helper
Understanding the Importance of Endpoint Management in Virtual IT Environment...
Understanding the Importance of Endpoint Management in Virtual IT Environment...Understanding the Importance of Endpoint Management in Virtual IT Environment...
Understanding the Importance of Endpoint Management in Virtual IT Environment...
Onsite Helper
Microsoft Intune vs Google Endpoint Management
Microsoft Intune vs Google Endpoint ManagementMicrosoft Intune vs Google Endpoint Management
Microsoft Intune vs Google Endpoint Management
Onsite Helper
7 Steps to Successfully Installing Google Credential Provider for Windows 11
7 Steps to Successfully Installing Google Credential Provider for Windows 117 Steps to Successfully Installing Google Credential Provider for Windows 11
7 Steps to Successfully Installing Google Credential Provider for Windows 11
Onsite Helper
An Insight into Essential Eights Multi-Factor Authentication
An Insight into Essential Eights Multi-Factor AuthenticationAn Insight into Essential Eights Multi-Factor Authentication
An Insight into Essential Eights Multi-Factor Authentication
Onsite Helper
Understanding Essential 8 Maturity Models and How to Pick the Right One
Understanding Essential 8 Maturity Models and How to Pick the Right OneUnderstanding Essential 8 Maturity Models and How to Pick the Right One
Understanding Essential 8 Maturity Models and How to Pick the Right One
Onsite Helper
Explore and Apply Managed IT Services Australia in Your Business
Explore and Apply Managed IT Services Australia in Your BusinessExplore and Apply Managed IT Services Australia in Your Business
Explore and Apply Managed IT Services Australia in Your Business
Onsite Helper
Keep your medium-sized business assets safe and secure with our range of mana...
Keep your medium-sized business assets safe and secure with our range of mana...Keep your medium-sized business assets safe and secure with our range of mana...
Keep your medium-sized business assets safe and secure with our range of mana...
Onsite Helper
Step-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity FrameworkStep-by-Step Implementation of the Essential 8 Cybersecurity Framework
Step-by-Step Implementation of the Essential 8 Cybersecurity Framework
Onsite Helper
What is BIMI & Why Do You Need It for Your Business
What is BIMI & Why Do You Need It for Your BusinessWhat is BIMI & Why Do You Need It for Your Business
What is BIMI & Why Do You Need It for Your Business
Onsite Helper
Google Credential Provider for Windows: What it is and why you need it
Google Credential Provider for Windows: What it is and why you need it Google Credential Provider for Windows: What it is and why you need it
Google Credential Provider for Windows: What it is and why you need it
Onsite Helper
Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...
Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...
Cost Analysis for Achieving Essential Eight Compliance Across Various Operati...
Onsite Helper
Understanding Compliance Options for IT Security.pdf
Understanding Compliance Options for IT Security.pdfUnderstanding Compliance Options for IT Security.pdf
Understanding Compliance Options for IT Security.pdf
Onsite Helper

Recently uploaded (20)

Data-Driven Public Safety: Reliable Data When Every Second Counts
Data-Driven Public Safety: Reliable Data When Every Second CountsData-Driven Public Safety: Reliable Data When Every Second Counts
Data-Driven Public Safety: Reliable Data When Every Second Counts
Safe Software
Blockchain for Businesses Practical Use Cases & Benefits.pdf
Blockchain for Businesses Practical Use Cases & Benefits.pdfBlockchain for Businesses Practical Use Cases & Benefits.pdf
Blockchain for Businesses Practical Use Cases & Benefits.pdf
Yodaplus Technologies Private Limited
Teaching Prompting and Prompt Sharing to End Users.pptx
Teaching Prompting and Prompt Sharing to End Users.pptxTeaching Prompting and Prompt Sharing to End Users.pptx
Teaching Prompting and Prompt Sharing to End Users.pptx
Michael Blumenthal (Microsoft MVP)
Big Data Analytics Quick Research Guide by Arthur Morgan (PREVIEW)
Big Data Analytics Quick Research Guide by Arthur Morgan (PREVIEW)Big Data Analytics Quick Research Guide by Arthur Morgan (PREVIEW)
Big Data Analytics Quick Research Guide by Arthur Morgan (PREVIEW)
Arthur Morgan
What is FinTech A Complete Guide to Financial Technology.pdf
What is FinTech A Complete Guide to Financial Technology.pdfWhat is FinTech A Complete Guide to Financial Technology.pdf
What is FinTech A Complete Guide to Financial Technology.pdf
Yodaplus Technologies Private Limited
Benchmark Testing Demystified: Your Roadmap to Peak Performance
Benchmark Testing Demystified: Your Roadmap to Peak PerformanceBenchmark Testing Demystified: Your Roadmap to Peak Performance
Benchmark Testing Demystified: Your Roadmap to Peak Performance
Shubham Joshi
Temporary Compound microscope slide .pptx
Temporary Compound microscope slide .pptxTemporary Compound microscope slide .pptx
Temporary Compound microscope slide .pptx
Samir Sharma
2025-02-24 - AWS meetup - Zilliz presentation.pdf
2025-02-24 - AWS meetup - Zilliz presentation.pdf2025-02-24 - AWS meetup - Zilliz presentation.pdf
2025-02-24 - AWS meetup - Zilliz presentation.pdf
Ivan Tang
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
Deno ...................................
Deno ...................................Deno ...................................
Deno ...................................
Robert MacLean
Caching for Performance Masterclass: Caching Strategies
Caching for Performance Masterclass: Caching StrategiesCaching for Performance Masterclass: Caching Strategies
Caching for Performance Masterclass: Caching Strategies
ScyllaDB
THE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIA
THE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIATHE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIA
THE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIA
Srivaanchi Nathan
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdfSECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
spub1985
Caching for Performance Masterclass: The In-Memory Datastore
Caching for Performance Masterclass: The In-Memory DatastoreCaching for Performance Masterclass: The In-Memory Datastore
Caching for Performance Masterclass: The In-Memory Datastore
ScyllaDB
Understanding & Utilizing SharePoint Advanced Management
Understanding & Utilizing SharePoint Advanced ManagementUnderstanding & Utilizing SharePoint Advanced Management
Understanding & Utilizing SharePoint Advanced Management
Drew Madelung
5 Must-Use AI Tools to Supercharge Your Productivity
5 Must-Use AI Tools to Supercharge Your Productivity5 Must-Use AI Tools to Supercharge Your Productivity
5 Must-Use AI Tools to Supercharge Your Productivity
cryptouniversityoffi
Webinar: LF Energy GEISA: Addressing edge interoperability at the meter
Webinar: LF Energy GEISA: Addressing edge interoperability at the meterWebinar: LF Energy GEISA: Addressing edge interoperability at the meter
Webinar: LF Energy GEISA: Addressing edge interoperability at the meter
DanBrown980551
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
Artificial Intelligence Quick Research Guide by Arthur Morgan
Artificial Intelligence Quick Research Guide by Arthur MorganArtificial Intelligence Quick Research Guide by Arthur Morgan
Artificial Intelligence Quick Research Guide by Arthur Morgan
Arthur Morgan
DealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures CapitalDealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures Capital
Yevgen Sysoyev
Data-Driven Public Safety: Reliable Data When Every Second Counts
Data-Driven Public Safety: Reliable Data When Every Second CountsData-Driven Public Safety: Reliable Data When Every Second Counts
Data-Driven Public Safety: Reliable Data When Every Second Counts
Safe Software
Big Data Analytics Quick Research Guide by Arthur Morgan (PREVIEW)
Big Data Analytics Quick Research Guide by Arthur Morgan (PREVIEW)Big Data Analytics Quick Research Guide by Arthur Morgan (PREVIEW)
Big Data Analytics Quick Research Guide by Arthur Morgan (PREVIEW)
Arthur Morgan
Benchmark Testing Demystified: Your Roadmap to Peak Performance
Benchmark Testing Demystified: Your Roadmap to Peak PerformanceBenchmark Testing Demystified: Your Roadmap to Peak Performance
Benchmark Testing Demystified: Your Roadmap to Peak Performance
Shubham Joshi
Temporary Compound microscope slide .pptx
Temporary Compound microscope slide .pptxTemporary Compound microscope slide .pptx
Temporary Compound microscope slide .pptx
Samir Sharma
2025-02-24 - AWS meetup - Zilliz presentation.pdf
2025-02-24 - AWS meetup - Zilliz presentation.pdf2025-02-24 - AWS meetup - Zilliz presentation.pdf
2025-02-24 - AWS meetup - Zilliz presentation.pdf
Ivan Tang
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
Deno ...................................
Deno ...................................Deno ...................................
Deno ...................................
Robert MacLean
Caching for Performance Masterclass: Caching Strategies
Caching for Performance Masterclass: Caching StrategiesCaching for Performance Masterclass: Caching Strategies
Caching for Performance Masterclass: Caching Strategies
ScyllaDB
THE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIA
THE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIATHE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIA
THE BIG TEN BIOPHARMACEUTICAL MNCs: GLOBAL CAPABILITY CENTERS IN INDIA
Srivaanchi Nathan
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdfSECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
SECURE BLOCKCHAIN FOR ADMISSION PROCESSING IN EDUCATIONAL INSTITUTIONS.pdf
spub1985
Caching for Performance Masterclass: The In-Memory Datastore
Caching for Performance Masterclass: The In-Memory DatastoreCaching for Performance Masterclass: The In-Memory Datastore
Caching for Performance Masterclass: The In-Memory Datastore
ScyllaDB
Understanding & Utilizing SharePoint Advanced Management
Understanding & Utilizing SharePoint Advanced ManagementUnderstanding & Utilizing SharePoint Advanced Management
Understanding & Utilizing SharePoint Advanced Management
Drew Madelung
5 Must-Use AI Tools to Supercharge Your Productivity
5 Must-Use AI Tools to Supercharge Your Productivity5 Must-Use AI Tools to Supercharge Your Productivity
5 Must-Use AI Tools to Supercharge Your Productivity
cryptouniversityoffi
Webinar: LF Energy GEISA: Addressing edge interoperability at the meter
Webinar: LF Energy GEISA: Addressing edge interoperability at the meterWebinar: LF Energy GEISA: Addressing edge interoperability at the meter
Webinar: LF Energy GEISA: Addressing edge interoperability at the meter
DanBrown980551
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
Artificial Intelligence Quick Research Guide by Arthur Morgan
Artificial Intelligence Quick Research Guide by Arthur MorganArtificial Intelligence Quick Research Guide by Arthur Morgan
Artificial Intelligence Quick Research Guide by Arthur Morgan
Arthur Morgan
DealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures CapitalDealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures Capital
Yevgen Sysoyev

Dark Web What it is & How Does it Work

  • 1. Dark Web What it is & How Does it Work?
  • 2. While the name makes us think of dark alleys in dangerous neighborhoods, the Dark Web is quite simply an anonymous communications platform on the Internet. And, according to the Dark Web specialists from Secmon1, it was invented by the US military as a security exercise. This is a perfect example of how technology that was intended to be used for good (to test if the scenario is possible) can be turned to the dark side Introduction
  • 4. The dark web is mostly used for illegal activities such as fraud (selling credit card details, personal information for identity theft or company data), drug dealing (check out the Silk Road story), and more. Here, you can also find information stolen from corporations and organizations (by hackers) and published for anyone to see. In these scenarios, the hackers consider that the leaked data should be publicly accessible, as a way to fight for a just cause or right a wrong. What its used for?
  • 5. The Dark Web as a whole is not that much more different than the internet we know. However, there are some things that would throw off a regular user (at least at first). For instance, these sites are not indexed by a search engine. In fact, they do everything possible to avoid this. In addition, the URL structure is different as all the domain extensions are replaced with .onion and all the domain names are just a string of random text. How Does it Look Like?
  • 6. The Dark Web is festering with illegal online activities, but most of them are left to the proper authorities. However, most companies that ever went through a data breach, worry that their data is publicly available somewhere online. How To Protect Your Interests?
  • 7. In short, cybercriminals will get anything they can get their hands on. This includes all sorts of files (word, excel, pdfs, accounting files), CRM (Customer Relationship Management) data, and more. A recent example is the Australian Toll breach where personal employee information, customers, financial information ended up on the Dark Web. What Data are Cybercriminals after?
  • 8. While there is no one sure way to keep your companys data safe, there are several steps every company should take to increase protection: Know where your sensitive data is stored: Is it in the cloud, is it on any computers or servers at the office? Reduce your sensitive data footprint: Is it easy to manage the security for all the locations of where the sensitive data is stored? Does all the sensitive data need to be accessible, can we archive it and take it offline in a secure location (e.g put it on an external hard drive and store it in a safe)? Automate the classification of your data Ensure sensitive data is classified and stored in safe and secure locations Automate remediation of data where it is saved to less controlled parts of your network How to Stay Safe
  • 9. Apply the Essential 8: Security Recommendations from The Australian Government to ensure the IT security of your computers and servers are very strong Apply DLP (Data Loss Prevention) in your cloud applications like Google Workspace or Office 365 this can prevent sensitive data from incorrectly or maliciously being sent outside the organization. Onsite Helpers recommendation to reduce vulnerability