SlideShare a Scribd company logo
1 of 15
DEEP WEB
FROM:
GAURAV PANDEY
Internet is divided in two parts:
1. Surface Web
(Represents only 4% of all that exists and we know on the internet)
2. Deep Web
(Represents 96% remaining)
This information is not always available for us.
We can found :
What is Surface Web?
Webpages with static or persistent URLs
that can be detected by a search engine
crawler.
Once detected the URL is added to that
search engine’s database and can become a
result in a query or search of that search
engine.
What is Deep Web?
The Deep Web is the “hidden” part of the web.
Inaccessible to conventional search engines, and
consequently, to most users.
Sometimes called the “Invisible Web”, includes
information contained in searchable databases that
can only be reached by a direct query or a
specialized search engine.
Information is contained in dynamic WebPages
that are generated upon request to a database. It
has no persistent or static URL.
Levels of the Internet and to which
belongs the Deep Web
1. Surface Web
2. Bergie Web
3. Deep Web
4. Charter Web
5. Mariana’s Web
How to access Deep web ?
This place is actually in the internet world, but you cannot access
this by using the normal browser, it’s not secure way.
If you want to access the deep web , you require to use special
software, such as Tor (The Onion Router).
Tor is a free open source browser software which uses onion
routing process.
This browser provides you very secure place. Since this software
creates encrypt environment for you, means no one can access your
data and not able to see it.
In order to use most of the sites on deep web, you must be able to
access and browse .onion sites on the Tor network.
The Onion Router
Tor is software that installs into your browser and sets up the specific
connections you need to access Deep Web websites.
Critically it is free software for enabling online anonymity and censorship
resistance.
Onion routing refers to the process of removing encryption layers from
Internet communications, similar to peeling back the layers of an onion.
Using Tor makes it more difficult to trace Internet activity , including “visits
to websites online posts, and other communication forms”, back to user.
It is intended to protect the personal privacy of users, as well as their
freedom and ability to conduct confidential business by keeping their Internet
activities from being monitored.
Instead of seeing domains that end in .com or .org, these hidden sites end in
.onion
How Tor works?
Examples:
The most infamous of these .onion sites was the now-
defunct Silk Road, an online marketplace where users
can buy drugs, guns and all sorts of other illegal items.
The FBI arrested Ross William Ulbricht who used to run
Silk Road website under the name “Dread Pirate
Roberts”.
Website:
silkroad6ownowfk.onion
Future
 The lines between search engine content and deep web have
begun to blur, as search services start to provide access to
part or all of once-restricted content.
 An increasing amount of deep web content is opening up to
free search as publishers and libraries make agreements with
large search engine.
 In the future, deep web content may be defined less by
opportunity for search than by access fees or other types of
authentication.
Conclusion
 Despite the vast amount of information the Deep Web contains,
it is still an ambiguous part of the digital world.
 Many internet users have not heard of it and believe that what
they see on their Google search results is all that the Web has
to offer.
 Other would rather have it abolished, claiming that it is an
underground world of crime and unethical behavior.
References
• https://en.wikipedia.org/wiki/Deep_web accessed on 19/10/2017
at 21:45.
• https://en.wikipedia.org/wiki/Silk_Road_(marketplace) accessed
on 19/10/2017 at 22:00.
• https://computer.howstuffworks.com/internet/basics/how-
the-deep-web-works5.htm accessed on 19/10/2017 at 22:00.
• https://www.deepweb-sites.com/ accessed on 21/10/2017 at 21:47.
THANK YOU!!

More Related Content

What's hot (20)

Deep web
Deep webDeep web
Deep web
 
The deepweb
The deepwebThe deepweb
The deepweb
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
 
Dark wed
Dark wedDark wed
Dark wed
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Deep web
Deep webDeep web
Deep web
 
The dark web
The dark webThe dark web
The dark web
 
Deep web
Deep webDeep web
Deep web
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
The Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to CreepyThe Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to Creepy
 
Deep Web
Deep WebDeep Web
Deep Web
 
Deep web
Deep webDeep web
Deep web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 

Similar to Deep web

Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep WebIRJET Journal
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebNicholas Davis
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight IntelliaggGavin O'Toole
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark WebAmit Biwaal
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
DEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxismailwinofo
 
Hidden Wiki Darkweb.docx
Hidden Wiki Darkweb.docxHidden Wiki Darkweb.docx
Hidden Wiki Darkweb.docxcirek63365
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Dark Web Sites.pdf
Dark Web Sites.pdfDark Web Sites.pdf
Dark Web Sites.pdfVograce
 

Similar to Deep web (20)

Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Darknet
DarknetDarknet
Darknet
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Darkweb
DarkwebDarkweb
Darkweb
 
Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep Web
 
Dark Web
Dark WebDark Web
Dark Web
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web
 
The Deep Web.pptx
The Deep Web.pptxThe Deep Web.pptx
The Deep Web.pptx
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
DEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptx
 
Hidden Wiki Darkweb.docx
Hidden Wiki Darkweb.docxHidden Wiki Darkweb.docx
Hidden Wiki Darkweb.docx
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
The Deep Hidden Web
The Deep Hidden WebThe Deep Hidden Web
The Deep Hidden Web
 
Dark Web Sites.pdf
Dark Web Sites.pdfDark Web Sites.pdf
Dark Web Sites.pdf
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Deep web

  • 2. Internet is divided in two parts: 1. Surface Web (Represents only 4% of all that exists and we know on the internet) 2. Deep Web (Represents 96% remaining) This information is not always available for us. We can found :
  • 3. What is Surface Web? Webpages with static or persistent URLs that can be detected by a search engine crawler. Once detected the URL is added to that search engine’s database and can become a result in a query or search of that search engine.
  • 4. What is Deep Web? The Deep Web is the “hidden” part of the web. Inaccessible to conventional search engines, and consequently, to most users. Sometimes called the “Invisible Web”, includes information contained in searchable databases that can only be reached by a direct query or a specialized search engine. Information is contained in dynamic WebPages that are generated upon request to a database. It has no persistent or static URL.
  • 5. Levels of the Internet and to which belongs the Deep Web 1. Surface Web 2. Bergie Web 3. Deep Web 4. Charter Web 5. Mariana’s Web
  • 6. How to access Deep web ? This place is actually in the internet world, but you cannot access this by using the normal browser, it’s not secure way. If you want to access the deep web , you require to use special software, such as Tor (The Onion Router). Tor is a free open source browser software which uses onion routing process. This browser provides you very secure place. Since this software creates encrypt environment for you, means no one can access your data and not able to see it. In order to use most of the sites on deep web, you must be able to access and browse .onion sites on the Tor network.
  • 7. The Onion Router Tor is software that installs into your browser and sets up the specific connections you need to access Deep Web websites. Critically it is free software for enabling online anonymity and censorship resistance. Onion routing refers to the process of removing encryption layers from Internet communications, similar to peeling back the layers of an onion. Using Tor makes it more difficult to trace Internet activity , including “visits to websites online posts, and other communication forms”, back to user. It is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential business by keeping their Internet activities from being monitored. Instead of seeing domains that end in .com or .org, these hidden sites end in .onion
  • 9. Examples: The most infamous of these .onion sites was the now- defunct Silk Road, an online marketplace where users can buy drugs, guns and all sorts of other illegal items. The FBI arrested Ross William Ulbricht who used to run Silk Road website under the name “Dread Pirate Roberts”. Website: silkroad6ownowfk.onion
  • 10.
  • 11.
  • 12. Future  The lines between search engine content and deep web have begun to blur, as search services start to provide access to part or all of once-restricted content.  An increasing amount of deep web content is opening up to free search as publishers and libraries make agreements with large search engine.  In the future, deep web content may be defined less by opportunity for search than by access fees or other types of authentication.
  • 13. Conclusion  Despite the vast amount of information the Deep Web contains, it is still an ambiguous part of the digital world.  Many internet users have not heard of it and believe that what they see on their Google search results is all that the Web has to offer.  Other would rather have it abolished, claiming that it is an underground world of crime and unethical behavior.
  • 14. References • https://en.wikipedia.org/wiki/Deep_web accessed on 19/10/2017 at 21:45. • https://en.wikipedia.org/wiki/Silk_Road_(marketplace) accessed on 19/10/2017 at 22:00. • https://computer.howstuffworks.com/internet/basics/how- the-deep-web-works5.htm accessed on 19/10/2017 at 22:00. • https://www.deepweb-sites.com/ accessed on 21/10/2017 at 21:47.