SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
DEEP WEB 
Melody Chiaoco
DID YOU 
KNOW 
DID YOU KNOW 
• The web you know – Facebook, Wikipedia, 
makes up less than 1% of the entire World 
Wide Web. 
• When you surf the Web, you really are just 
floating at the surface. Dive below and there 
are tens of trillions of pages -- that most 
people have never seen. 
• The deep Web may be 400 to 500 times bigger 
that the surface Web
WHAT IS THE DEEP 
•WTheE deBep W?e b (also known as the undernet, invisible 
Web and hidden Web, among other monikers) consists 
of data that you won't locate with a simple Google 
search. 
• It is hundreds (or perhaps even thousands) of times 
bigger that the surface Web. 
• Users really do intentionally bury data. Often, these 
parts of the Web are accessible only if you use special 
browser software that helps to peel away the onion-like 
layers of the dark Web.
You can find illegal goods and activities of all 
kinds through the dark Web. That includes illicit 
drugs, child pornography, stolen credit card 
numbers, human trafficking, weapons, exotic 
animals, copyrighted media and etc.
WHAT IS TOR? 
• Also know as the The Onion Router 
• People use Tor so that their web activity can’t be 
traced. 
• Tor is software that installs into your browser 
and sets up the specific connections you need 
to access dark Web sites. 
• Instead of seeing domains 
that end in .com or .org, 
these hidden sites end in 
.onion.
The deep Web will continue to 
perplex and fascinate 
everyone who uses the 
Internet. It contains an 
enthralling amount of 
knowledge that could help us 
evolve technologically and as 
a species when connected to 
other bits of information.
REFERRENCES: 
• http://money.cnn.com/2014/03/10/technolog 
y/deep-web/ 
• http://computer.howstuffworks.com/internet/ 
basics/how-the-deep-web-works7.htm

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Darknet
DarknetDarknet
Darknet
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
 
Deep and dark web
Deep and dark webDeep and dark web
Deep and dark web
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
The dark web
The dark webThe dark web
The dark web
 
Dark wed
Dark wedDark wed
Dark wed
 
Deep web
Deep webDeep web
Deep web
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
The dark web
The dark webThe dark web
The dark web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Deep Web
Deep WebDeep Web
Deep Web
 

Destaque (17)

Deep web
Deep webDeep web
Deep web
 
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
 
Deep web
Deep webDeep web
Deep web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Darknet
DarknetDarknet
Darknet
 
Deep web
Deep webDeep web
Deep web
 
Darknet
DarknetDarknet
Darknet
 
Darknet
DarknetDarknet
Darknet
 
Deep or dark web
Deep or dark webDeep or dark web
Deep or dark web
 
Deep web (Dark side)
Deep web (Dark side)Deep web (Dark side)
Deep web (Dark side)
 
Deep web
Deep webDeep web
Deep web
 
Deep Web & Dark Web
Deep Web & Dark WebDeep Web & Dark Web
Deep Web & Dark Web
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Review jurnal kualitatif
Review jurnal kualitatifReview jurnal kualitatif
Review jurnal kualitatif
 
Modul 3
Modul 3Modul 3
Modul 3
 
Presentation1
Presentation1Presentation1
Presentation1
 

Semelhante a The Deep Web

Deep web
Deep webDeep web
Deep webV C
 
The Deep Web
The Deep WebThe Deep Web
The Deep Webmartinp
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR BrowserArjith K Raj
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxIbrahimSami14
 
Web or Dark Web (Aryan Singh)
Web or Dark Web (Aryan Singh)Web or Dark Web (Aryan Singh)
Web or Dark Web (Aryan Singh)KNIPSS
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Deep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfDeep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfkabirhasan11
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
 

Semelhante a The Deep Web (20)

Overview of Deep web
Overview of Deep webOverview of Deep web
Overview of Deep web
 
Deep web
Deep webDeep web
Deep web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
Deep web
Deep webDeep web
Deep web
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Web or Dark Web (Aryan Singh)
Web or Dark Web (Aryan Singh)Web or Dark Web (Aryan Singh)
Web or Dark Web (Aryan Singh)
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Dark Web
Dark WebDark Web
Dark Web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Deep web Seminar
Deep web Seminar Deep web Seminar
Deep web Seminar
 
Deep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfDeep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdf
 
Darknet
DarknetDarknet
Darknet
 
Dark net
Dark netDark net
Dark net
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 

Último

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 

Último (9)

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 

The Deep Web

  • 1. DEEP WEB Melody Chiaoco
  • 2. DID YOU KNOW DID YOU KNOW • The web you know – Facebook, Wikipedia, makes up less than 1% of the entire World Wide Web. • When you surf the Web, you really are just floating at the surface. Dive below and there are tens of trillions of pages -- that most people have never seen. • The deep Web may be 400 to 500 times bigger that the surface Web
  • 3. WHAT IS THE DEEP •WTheE deBep W?e b (also known as the undernet, invisible Web and hidden Web, among other monikers) consists of data that you won't locate with a simple Google search. • It is hundreds (or perhaps even thousands) of times bigger that the surface Web. • Users really do intentionally bury data. Often, these parts of the Web are accessible only if you use special browser software that helps to peel away the onion-like layers of the dark Web.
  • 4. You can find illegal goods and activities of all kinds through the dark Web. That includes illicit drugs, child pornography, stolen credit card numbers, human trafficking, weapons, exotic animals, copyrighted media and etc.
  • 5. WHAT IS TOR? • Also know as the The Onion Router • People use Tor so that their web activity can’t be traced. • Tor is software that installs into your browser and sets up the specific connections you need to access dark Web sites. • Instead of seeing domains that end in .com or .org, these hidden sites end in .onion.
  • 6. The deep Web will continue to perplex and fascinate everyone who uses the Internet. It contains an enthralling amount of knowledge that could help us evolve technologically and as a species when connected to other bits of information.
  • 7. REFERRENCES: • http://money.cnn.com/2014/03/10/technolog y/deep-web/ • http://computer.howstuffworks.com/internet/ basics/how-the-deep-web-works7.htm