2. INTERNET
The internet is a globally
connected network system.
When most of us think of the
internet, we imagine day-to-day
activities like
1. Watching a video.
2. Checking the news.
3. Booking a vacation online.
3. SURFACE WEB
The surface web is the portion of
content on the INTERNET that is readily
available to the general public and
searchable with standard search
engines.
The Surface Web only consists of 10
percent of the information that is on the
internet.
Google's index of the surface web
contains about 14.5 billion pages.
4. DEEP WEB - I
Deep Web is a part of the invisible web
that a normal user cannot access.
Deep Web access only if one has the
authorization or login credentials to do so.
The data stored in the deep ranges from
Personal information (including military
data)
Financial records.
Academic databases.
Medical records.
Government records.
5. DEEP WEB - II
You just need a special authorization or
access credentials to access the
information on the Deep Web.
Example:
You normally generate a PIN or OTP to
access your online banking account
It is only once you enter the PIN/OTP that
you are able to log into your account.
You cannot get into your account by typing
Sumit Parvats Banking Account on a
search engine.
6. DARK WEB - I
Dark Web an encrypted section of the web
that offers complete anonymity as it is not
indexed by search engines.
It requires the use of an anonymizing
browser called Tor to be accessed.
The dark web is an instrument to illegal
activities like
Child pornography
The sale of drugs
Firearms
Stolen credit card numbers.
7. What is Available on The Dark Web?
Credit card numbers
Fake passports
Stolen/Hacked Accounts
Fake College Degrees
Murder for hire/Assassination
Plastic Explosives
Weapons
SWAT-style body armour
Hacked Government Data
DARK WEB - II
8. THE TOR PROJECT
Tor is free and open-source software
for enabling anonymous
communication.
the original software project name "The
Onion Router.
Tor was developed in the mid-1990s by
United States Naval Research
Laboratory employees.
To exchange sensitive and confidential
data anonymously.
9. WORKING OF TOR
Your data is bundled into an encrypted packet
when it enters the Tor network.
Tor strips away part of the packet's header.
Tor encrypts the rest of the addressing information,
called the packet wrapper.
The modified and encrypted data packet is then
routed through many of these servers, called
relays, on the way to its final destination
Each relay decrypts only enough of the data
packet wrapper to know which relay the data came
from, and which relay to send it to next.
The relay then rewraps the package in a new
wrapper and sends it on.