Deep and Dark on the Web By: Todd Careless.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

What is the invisible web?  All information that cannot be indexed using general web search engines  Also known as the deep internet, deepnet, or the.
Dark net . . Invisible Web . . Hidden Web . .
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
UNIFORM RESOURCE LOCATOR (URL)
Threats to I.T Internet security By Cameron Mundy.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Cyber Crimes.
Reliability & Desirability of Data
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Protecting Your Information Assets
IT security By Tilly Gerlack.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
The Silk Road: An Online Marketplace
The Tor Network BY: CONOR DOHERTY AND KENNETH CABRERA.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
THE INTERNET INTRODUCTION TO BUSINESS TECHNOLOGY.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
The Internet What is the Internet? The Internet is a lot of computers over the whole world connected together so that they can share information. It.
IN THIS LESSON WE WILL REVIEW THE STRUCTURE OF THE INTERNET AND HOW BROWSERS ASSEMBLE WEBSITES BASED ON INSTRUCTIONS THEY RECEIVE FROM SERVERS. Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
VCE IT Theory Slideshows
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
What is the Internet? © EIT, Author Gay Robertson, 2016.
Lesson 3 Safe Computing.
Tor Internals and Hidden Services
Software Applications for end-users
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Deep and Dark on the Web By: Jim Martin.
Lesson 2- Protecting Yourself Online
Exercise ?: TOR.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Risk of the Internet At Home
Dark Web, I2P, and Deep Web Team 5
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Created by Kęstutis Stankevičius II-06/3 2006/10/24
Internet Safety Vocabulary
Understanding Browsers
Objectives To understand the about types of computer network
What is the World Wide Web (www)
Introduction to Computer Concept
King Saud University- College OF Applied Studies
The dark web By Riley. Sampare.
Research Lesson 1 URLs & Hyperlinks How to access the World Wide Web.
Research Lesson 1 URLs & Hyperlinks How to access the World Wide Web.
King Saud University- College OF Applied Studies
Computer Security By: Muhammed Anwar.
The Internet: Encryption & Public Keys
Lesson 2- Protecting Yourself Online
Internet Vocabulary Beth Felton McKelvey.
How does the deep web work?
The Internet.
The Internet and Electronic mail
CS101 Security.
Networks, Legal and Ethical Behaviors BSU CS4MS - 4/9/19
Presentation transcript:

Deep and Dark on the Web By: Todd Careless

Be Prepared Criminal activity that is spanned by the Dark Web includes: theft of intellectual property financial fraud hacking and terrorism  Organizations must take proactive steps to be prepared for these threats.  In order to be ready, companies need to be well informed about this type of criminal activity in order to prevent and overcome any potential threats.  

Dangers “The possibility of users infecting their computers with malware – software that targets a computer with malicious intent –when visiting the dark web is high unless precautions are taken.” According to a Motherboard article, casual visitors to a dark web site can unknowingly expose their computers to the following programs: Vawtrack: Designed to gain access to victims’ financial accounts Skynet: Used to steal bitcoins or engage in DDoS (distributed denial of service) attacks on other websites using the victim’s computer Nionspy: Can capture keystrokes, steal documents, and record audio and video using the infected computer” (The Dark Web is Becoming a Safe Haven for Malware)   http://motherboard.vice.com/read/malware-is-using-the-dark-web-to-stay-hidden

The Web We Want to Know (WWW) The Internet is a Giant, Huge, Gargantuan and Very BIG Network We see the tip of the proverbial iceberg of information Less than 1% according to some sources Over 550,000,000 registered domains Works just like a network, only bigger Got to know the address CSA Conference 04 Deep and Dark Web-April 2016

WWW = World Wide Web Lots of data out there for the taking Google and others take it and serve it up for you from the tips of the icebergs seen Go or trace only so far as the doors open How? Indexing Spiders and other crawlers Analytics What you SEE is What you Get It’s what you can’t see…. Link after link after link TV news site-stories fade away from search index engines. Go to site to find out more CSA Conference 04 Deep and Dark Web-April 2016

Legitimate Deep Below the Iceberg Deep Web Corporate Areas Personnel Area (W-2, Vacation, IRA…) Financial Area (Investments, Filings…) Group Think/Collaboration Area (SharePoint) Academic Areas Personnel Areas (Scheduling, Football Tickets…) Financial Area (Tuition, Housing…) Group Think/Collaboration Area (Blackboard, Online classes…) Password protected sites Legitimate CSA Conference 04 Deep and Dark Web-April 2016

Deeper you go-Darker it Gets Dark Web Anything and Everything Drugs Legal and Illegal Sex Child Exploitation Rock & Roll Music Software Silk Road Investigation Illegitimate

Can’t Get There from Here Normal Browsers go to Normal Places Internet Explorer Chrome Firefox Safari Opera Camino Confined to WWW Known Areas Areas it can see Areas it can index CSA Conference 04 Deep and Dark Web-April 2016

Get Off the Highway Interstate Road System = WWW Big Cities on the Highways hold the information Exit at your Peril Lots of Land outside the Big Cities Need to ask directions Regular Maps don’t work Enter Tor

The Onion Router Tor Special Browser for Special Places Anonymous browsing through servers Hops are encrypted and random Circuits of encrypted networks Difficult to trace

Letter inside Package inside Box The Tor pathway is a circuit of three parts The address is on outside of each part Entry Node First connection Sends Box to Relay Node (Connects) Relay Node Opens the Box Sends Package to Exit Node Exit Node Opens the Package and reads the Letter Layers of the Onion… Like a letter inside a package inside a box. CSA Conference 04 Deep and Dark Web-April 2016

Different Routes Entry Relay Exit Address are routed through different nodes Entry Relay Exit

Tor-The Good, The Bad, The Ugly Originated by USG for whistleblowers and other dissidents Companies use it to find out about the competition Journalist to communicate with sources LEO for research and intelligence Any and All Criminal Activity Naval Research Laboratory created it. London student to investigate foreign entities without revealing them. CSA Conference 04 Deep and Dark Web-April 2016

How Do You Pay for It? Bit by Bit Bitcoin Exchanging something of value: Electronically Virtual currency Decentralized No backing by any government authority or system Conceptualized by Satoshi Nakamoto in 2008 Initial purchase of Bitcoins from bank to place in your “wallet” then free to spend

Comparing Virtual to Real Peer to Peer Computer generated Currency USD GBP MXN Regulated Spending limits Assets Frozen Centralized Bank Bureau of the Mint Currency BTC No Regulations No Limits Nothing to Freeze

Digital Forensics and the Dark Web Digital forensics tools can be used to shed light on potential activity on the Dark Web: Look at URL’s visited by your employees Identify any accessed sites on the Dark Web Identify any processes that are running Determine if any of them are malicious

Questions?