Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > IBM > Dangers of the deep, dark web
 

Dangers of the deep, dark web

White Paper Published By: IBM
IBM
Published:  Oct 13, 2015
Type:  White Paper
Length:  8 pages

In the security world and mainstream media, the term “Deep Web” means that it’s not indexed by search engines, and is a place with much more content than the “standard” Internet (World Wide Web) everyone uses. It’s also a marketplace for special kinds of content: drugs, weapons, pornography, stolen data, and anything else a criminal entrepreneur might need or want to sell. Sites like this make up a subsection of the Deep Web known as the “Dark Web.” It’s not a neighborhood you visit for any legitimate reason.

Your organization needs to be aware of what happens in the Dark Web. Obviously, you don’t want users within your network accessing the illegal content and services stored there, but it’s also important to understand that there’s a less apparent danger. Content pertaining to your users and to your organization—potential attacks, leaked data, stolen accounts allowing direct access into your network—could be among the goods for sale.

This paper offers a high-level overview of two mainstream networks in the Deep Web: Tor or .onion sites and I2P. There are other, similar anonymous networks, but these are the two most used.



Tags : 
ibm, security, mainstream media, deep web, dark web, i2p