SlideShare a Scribd company logo
1 of 24
2/27/2023 1
2/27/2023 2
WEB
WEB
SURFACE WEB
DEEP WEB
DARK WEB
CYBER SECURITY
CONCLUSION
01
02
03
04
05
06
2/27/2023 3
2/27/2023 4
DEEP WEB DARK WEB
Levels of WEB
SURFACE WEB
2/27/2023 5
WEB
ICE-BERG
6
2/27/2023
Surface Web
• The surface web also known as world wide web is an
application of internet created in 1989 by Tim BERNERS
LEE and on this application media and information are
stored on our websites which are made available to
anyone through internet connection. When using the
web you will commonly be using a few main websites
like Google for searching, YouTube for entertainment and
media like twitter, Facebook etc. The one sure way to
search all of these sites is to Google them or using any
search engine.
7
01
2/27/2023
2/27/2023 8
• The data that you can’t search for on internet is
deep web. The majority of this content is like
hidden company data bases private servers
anything that requires user accounts, and
authentication to view. Most businesses store
terabytes of information in the form of securely
stored databases. This can be accessed through
browsers through network.
9
02 Deep Web
2/27/2023
2/27/2023 10
The dark web is the World Wide Web content that exists
on dark-nets, overlay networks that use the Internet but
require specific software, configurations, or authorization to
access.
Benefits:
"Internet anonymity. Through dark web you can be
arrested, tortured, and killed for the things you do
online. This is why the US government was instrumental
in developing the technology, and why the US State
Department continued to fund Tor over the years.“
You can do your business in your ways.
11
03 Dark Web
2/27/2023
2/27/2023 12
2/27/2023 13
Cyber Crime
2/27/2023 14
CYBER CRIME
INTRODUCTION
HISTORY
TYPES
CYBER SECURITY
ADVANTAGES OF CYBER
SECURITY
CONCLUSION
01
02
03
04
05
06
2/27/2023 15
Introduction to Cyber Crime
• Crime involves computer or a network
• Used to cause physical or mental harm to the people
directly or indirectly.
• Causes a huge harm to the people as well as economy.
• Used to modern technology like modems and other
internet devices etc.
01
2/27/2023 16
Cybercrime first started with hackers
trying to break into computer networks.
Some did it just for the thrill of accessing
high-level security networks, but others
sought to gain sensitive, classified
material.
History of Cyber crime
2/27/2023 17
History of Cyber crime
Eventually, criminals
started to infect
computer systems with
computer viruses, which
led to breakdowns on
personal and business
computers.
03
2/27/2023 18
TYPES OF CYBER CRIME
• Phishing
• Identity theft
• Hacking
• Scamming
• Child pornography
• Cyber Bullying
04
2/27/2023 19
CYBER SECURITY
• Protection of computer systems from theft or damage.
• Began with a research project.
• A computer program can move across a network, leaving a
small trail wherever it went.
• Cyber security experts are also called white hat hackers.
05
2/27/2023 20
ADVANTAGES
Protects us from the following:
• Virus attacks
• Worms
• Malware attacks
• Spyware
• Hacking attacks
• Data theft
06
2/27/2023 21
CONCLUSION
• Increase in technology increases the risks of cyber crimes.
• Students of related fields should be groomed properly and ethically
so that they could stay away from such activities.
• People should be aware of such attacks and take precautionary
measures.
• The cyber security department should also improve their skills and
technologies to prevent such attacks.
07
2/27/2023 22
Protect your INTERNET
FREEDOM
2/27/2023 23
Made with by

More Related Content

Similar to DarkWeb.pptx

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptxPradeeshSAI
 
Discover Cyber Security by 2 Web Design Inc.
Discover Cyber Security by 2 Web Design Inc.Discover Cyber Security by 2 Web Design Inc.
Discover Cyber Security by 2 Web Design Inc.Mohammad Shahid
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityHome
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004Mike Spaulding
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptxssuser84f16f
 
The Internet Of The Future: Here Are Best Examples Of Web3 In Practice
The Internet Of The Future: Here Are Best Examples Of Web3 In PracticeThe Internet Of The Future: Here Are Best Examples Of Web3 In Practice
The Internet Of The Future: Here Are Best Examples Of Web3 In PracticeBernard Marr
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPTpriya785691
 
En CCNA Security v11_ch01
En CCNA Security v11_ch01En CCNA Security v11_ch01
En CCNA Security v11_ch01Ajith Pathirana
 
Darkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxJamalAmzil6
 
WEB 3.0 The Decentralized Web.pptx
WEB 3.0 The Decentralized Web.pptxWEB 3.0 The Decentralized Web.pptx
WEB 3.0 The Decentralized Web.pptxUdoy Hasan
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthDababrata Mondal
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
NETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSESNETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSESSumit Pandey
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityPrateek Panda
 

Similar to DarkWeb.pptx (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber crime
 cyber crime cyber crime
cyber crime
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Discover Cyber Security by 2 Web Design Inc.
Discover Cyber Security by 2 Web Design Inc.Discover Cyber Security by 2 Web Design Inc.
Discover Cyber Security by 2 Web Design Inc.
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
The Internet Of The Future: Here Are Best Examples Of Web3 In Practice
The Internet Of The Future: Here Are Best Examples Of Web3 In PracticeThe Internet Of The Future: Here Are Best Examples Of Web3 In Practice
The Internet Of The Future: Here Are Best Examples Of Web3 In Practice
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 
dccn ppt-1.pptx
dccn ppt-1.pptxdccn ppt-1.pptx
dccn ppt-1.pptx
 
En CCNA Security v11_ch01
En CCNA Security v11_ch01En CCNA Security v11_ch01
En CCNA Security v11_ch01
 
Darkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptx
 
CSU-1.pptx
CSU-1.pptxCSU-1.pptx
CSU-1.pptx
 
WEB 3.0 The Decentralized Web.pptx
WEB 3.0 The Decentralized Web.pptxWEB 3.0 The Decentralized Web.pptx
WEB 3.0 The Decentralized Web.pptx
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
NETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSESNETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSES
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

DarkWeb.pptx

  • 3. WEB WEB SURFACE WEB DEEP WEB DARK WEB CYBER SECURITY CONCLUSION 01 02 03 04 05 06 2/27/2023 3
  • 5. DEEP WEB DARK WEB Levels of WEB SURFACE WEB 2/27/2023 5
  • 7. Surface Web • The surface web also known as world wide web is an application of internet created in 1989 by Tim BERNERS LEE and on this application media and information are stored on our websites which are made available to anyone through internet connection. When using the web you will commonly be using a few main websites like Google for searching, YouTube for entertainment and media like twitter, Facebook etc. The one sure way to search all of these sites is to Google them or using any search engine. 7 01 2/27/2023
  • 9. • The data that you can’t search for on internet is deep web. The majority of this content is like hidden company data bases private servers anything that requires user accounts, and authentication to view. Most businesses store terabytes of information in the form of securely stored databases. This can be accessed through browsers through network. 9 02 Deep Web 2/27/2023
  • 11. The dark web is the World Wide Web content that exists on dark-nets, overlay networks that use the Internet but require specific software, configurations, or authorization to access. Benefits: "Internet anonymity. Through dark web you can be arrested, tortured, and killed for the things you do online. This is why the US government was instrumental in developing the technology, and why the US State Department continued to fund Tor over the years.“ You can do your business in your ways. 11 03 Dark Web 2/27/2023
  • 15. CYBER CRIME INTRODUCTION HISTORY TYPES CYBER SECURITY ADVANTAGES OF CYBER SECURITY CONCLUSION 01 02 03 04 05 06 2/27/2023 15
  • 16. Introduction to Cyber Crime • Crime involves computer or a network • Used to cause physical or mental harm to the people directly or indirectly. • Causes a huge harm to the people as well as economy. • Used to modern technology like modems and other internet devices etc. 01 2/27/2023 16
  • 17. Cybercrime first started with hackers trying to break into computer networks. Some did it just for the thrill of accessing high-level security networks, but others sought to gain sensitive, classified material. History of Cyber crime 2/27/2023 17
  • 18. History of Cyber crime Eventually, criminals started to infect computer systems with computer viruses, which led to breakdowns on personal and business computers. 03 2/27/2023 18
  • 19. TYPES OF CYBER CRIME • Phishing • Identity theft • Hacking • Scamming • Child pornography • Cyber Bullying 04 2/27/2023 19
  • 20. CYBER SECURITY • Protection of computer systems from theft or damage. • Began with a research project. • A computer program can move across a network, leaving a small trail wherever it went. • Cyber security experts are also called white hat hackers. 05 2/27/2023 20
  • 21. ADVANTAGES Protects us from the following: • Virus attacks • Worms • Malware attacks • Spyware • Hacking attacks • Data theft 06 2/27/2023 21
  • 22. CONCLUSION • Increase in technology increases the risks of cyber crimes. • Students of related fields should be groomed properly and ethically so that they could stay away from such activities. • People should be aware of such attacks and take precautionary measures. • The cyber security department should also improve their skills and technologies to prevent such attacks. 07 2/27/2023 22

Editor's Notes

  1. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  2. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  3. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  4. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  5. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  6. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  7. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  8. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  9. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  10. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  11. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  12. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  13. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  14. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  15. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  16. © Copyright Showeet.com – Creative & Free PowerPoint Templates
  17. © Copyright Showeet.com – Creative & Free PowerPoint Templates