The Invisible Areas Of The World Wide Web

Even after more than 20 years of online access, the world is still at the beginning of the Internet revolution. 

Now the importance and influence of digital technology and media has already dwarfed that of television.  The pace of digital change and its impact will continue to accelerate over the next ten years.

 

The Internet: Still in the Early Evolutionary Stages
The Internet has globally transformed data and communications like nothing before. The inventions of the telegraph, telephone, radio, television and computer set the stage for this unprecedented integration of capabilities. The Internet is at once a world-wide broadcasting capability, a mechanism for information dissemination, and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. 

The history of the Internet begins with the development of electronic computers in the 1950s. Initial concepts of wide area networking originated in several computer science laboratories in the United States, United Kingdom, and France. 
The Internet represents one of the most successful examples of the benefits of sustained investment and commitment to research and development of information infrastructure. 

Beginning with the early research in packet switching, the government, industry and academia have been partners in evolving and deploying this exciting new technology. Following the Second World War and lasting through to the late 1980’s, a Cold War was fought between the world’s two superpowers, the United States and the now defunct Union of Soviet Socialist Republics. 

While military build ups, political sparring, and diplomatic manoeuvring were the most obvious activities, there were also many spin-off effects into other areas including some nearer and dearer to the heart of librarians and documentarists, such as research and education. For example, the Soviet Union’s jump-start of the space race with the launch of the Sputnik satellite in 1957 sparked a dedicated effort in the United States to boost scientific research. Academic and research libraries, by and large, became beneficiaries of the government largesse that resulted from this “knowledge race.” 

Collections boomed in order to keep up with the production of scientific literature. In order to control the resulting surge in bibliographical data, computers were enlisted to process the information then published as print or microfilmed indexes, and which subsequently would be transformed into databases accessible through the large host services that sprang up in the early 1970s 

This Internet now includes the World Wide Web which includes both the Deep Web and the Dark Web.
The Dark Web has a sinister, even foreboding, reputation for good reason. People go to the Dark Web to anonymously buy illegal narcotics, even to see child pornography.  Terrorists use the dark web to hide and organise. There are libraries of pirated books and music on the dark web. If the internet is an online world of towns and cities, then the dark web is the red-light districts, the hideouts of criminals and all the other dark alleys and criminal enterprises that exist the underground economy.

Nevertheless, the dark web is growing. More than growing, before long it will change the Internet as we know it.
Now okay, with that opening you might be picturing a darkness descending, pushing out the light of the Internet. In your head might be scenes reminiscent of a modern Batman movie as some villain takes over Gotham by shutting out the lights.
The thing is there is a lot more to the dark web than villains of every type.

The dark web is simply the portion of the Internet that can only be accessed on darknet, overlay networks that require specific software, configurations or authorisation to access.  The dark web is only a small part of the deep web, as the “deep web” is the portion of the Internet not indexed by web search engines.

Basically, the dark web is comprised of small peer-to-peer networks and larger and growing dark web networks like Tor, Freenet and I2P. The Tor portion of the dark web requires someone to download free software to be used as a browser. 
The name “Tor” comes from an acronym for the original software project name “The Onion Router.” Tor simply directs Internet traffic through a free, worldwide, volunteer overlay network. Round and around your signal goes in thousands of relays in an unknown sequence. This conceals your IP address and location.

The dark web then is certainly used by criminals, but it is increasingly also being used by individuals in countries that ban access to certain parts of the Internet, or that even hunt down and arrest people who say certain things or communicate with political dissidents.

The dark web is also being used by people in freer nations who simply are tired of their Internet traffic being watched and monetized by corporations. Some people would also rather not have their Google searches used against them in the future. Many aren’t interested in criminal behavior, but just have a penchant for privacy from government surveillance or the corporate world.

For more information: please read Cyber Security Intelligence’s book Easy Cyber Knowledge

Medium:           DigitalCenter

You Might Also Read:

Going To The Dark Web:

 

 

« Cyber Attacks On Africa Are Soaring
Few Businesses Are Ready For California’s New Consumer Data Privacy Law »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Intland Software

Intland Software

Intland offer an integrated Application Lifecycle Management platform that offers all-round Requirements, Development, and Testing & Quality Assurance functionality.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Bowbridge

Bowbridge

Bowbridge provides anti-virus and application security solutions for SAP systems.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

Hallam-ICS

Hallam-ICS

Hallam-ICS designs MEP systems for facilities and plants, control and automation solutions, and ensures safety and regulatory compliance.

Attack Research

Attack Research

We go far beyond standard tools and scripted tests. Find out if your network or technology can stand real-world and dedicated attackers.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange is a new initiative dedicated to advancing effective and innovative public policy in cybersecurity and digital privacy.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

MicroAge

MicroAge

Powered by five decades of experience, lasting partnerships, client relationships, and the values that guide us daily, MicroAge is here to help you secure, accelerate, and transform your business.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

Blackwired

Blackwired

Blackwired has established a new category in cyber security with an intelligence-led model based on the USMC’s Combat Hunter programme ‘Left of Bang’.

Boo Consulting

Boo Consulting

Boo Consulting is a trusted privacy and risk consultancy firm. We are driven to help you find an appropriate solution that will suit your budget and requirements.

ThingsRecon

ThingsRecon

ThingsRecon empowers organisations to continuously map and manage their attack surface, uncover hidden vulnerabilities, and assess supplier cyber hygiene.