7. Surface Web
• The surface web also known as world wide web is an
application of internet created in 1989 by Tim BERNERS
LEE and on this application media and information are
stored on our websites which are made available to
anyone through internet connection. When using the
web you will commonly be using a few main websites
like Google for searching, YouTube for entertainment and
media like twitter, Facebook etc. The one sure way to
search all of these sites is to Google them or using any
search engine.
7
01
2/27/2023
9. • The data that you can’t search for on internet is
deep web. The majority of this content is like
hidden company data bases private servers
anything that requires user accounts, and
authentication to view. Most businesses store
terabytes of information in the form of securely
stored databases. This can be accessed through
browsers through network.
9
02 Deep Web
2/27/2023
11. The dark web is the World Wide Web content that exists
on dark-nets, overlay networks that use the Internet but
require specific software, configurations, or authorization to
access.
Benefits:
"Internet anonymity. Through dark web you can be
arrested, tortured, and killed for the things you do
online. This is why the US government was instrumental
in developing the technology, and why the US State
Department continued to fund Tor over the years.“
You can do your business in your ways.
11
03 Dark Web
2/27/2023
16. Introduction to Cyber Crime
• Crime involves computer or a network
• Used to cause physical or mental harm to the people
directly or indirectly.
• Causes a huge harm to the people as well as economy.
• Used to modern technology like modems and other
internet devices etc.
01
2/27/2023 16
17. Cybercrime first started with hackers
trying to break into computer networks.
Some did it just for the thrill of accessing
high-level security networks, but others
sought to gain sensitive, classified
material.
History of Cyber crime
2/27/2023 17
18. History of Cyber crime
Eventually, criminals
started to infect
computer systems with
computer viruses, which
led to breakdowns on
personal and business
computers.
03
2/27/2023 18
20. CYBER SECURITY
• Protection of computer systems from theft or damage.
• Began with a research project.
• A computer program can move across a network, leaving a
small trail wherever it went.
• Cyber security experts are also called white hat hackers.
05
2/27/2023 20
21. ADVANTAGES
Protects us from the following:
• Virus attacks
• Worms
• Malware attacks
• Spyware
• Hacking attacks
• Data theft
06
2/27/2023 21
22. CONCLUSION
• Increase in technology increases the risks of cyber crimes.
• Students of related fields should be groomed properly and ethically
so that they could stay away from such activities.
• People should be aware of such attacks and take precautionary
measures.
• The cyber security department should also improve their skills and
technologies to prevent such attacks.
07
2/27/2023 22