SlideShare a Scribd company logo
DEEP WEB
FROM:
GAURAV PANDEY
Internet is divided in two parts:
1. Surface Web
(Represents only 4% of all that exists and we know on the internet)
2. Deep Web
(Represents 96% remaining)
This information is not always available for us.
We can found :
What is Surface Web?
Webpages with static or persistent URLs
that can be detected by a search engine
crawler.
Once detected the URL is added to that
search engine’s database and can become a
result in a query or search of that search
engine.
What is Deep Web?
The Deep Web is the “hidden” part of the web.
Inaccessible to conventional search engines, and
consequently, to most users.
Sometimes called the “Invisible Web”, includes
information contained in searchable databases that
can only be reached by a direct query or a
specialized search engine.
Information is contained in dynamic WebPages
that are generated upon request to a database. It
has no persistent or static URL.
Levels of the Internet and to which
belongs the Deep Web
1. Surface Web
2. Bergie Web
3. Deep Web
4. Charter Web
5. Mariana’s Web
How to access Deep web ?
This place is actually in the internet world, but you cannot access
this by using the normal browser, it’s not secure way.
If you want to access the deep web , you require to use special
software, such as Tor (The Onion Router).
Tor is a free open source browser software which uses onion
routing process.
This browser provides you very secure place. Since this software
creates encrypt environment for you, means no one can access your
data and not able to see it.
In order to use most of the sites on deep web, you must be able to
access and browse .onion sites on the Tor network.
The Onion Router
Tor is software that installs into your browser and sets up the specific
connections you need to access Deep Web websites.
Critically it is free software for enabling online anonymity and censorship
resistance.
Onion routing refers to the process of removing encryption layers from
Internet communications, similar to peeling back the layers of an onion.
Using Tor makes it more difficult to trace Internet activity , including “visits
to websites online posts, and other communication forms”, back to user.
It is intended to protect the personal privacy of users, as well as their
freedom and ability to conduct confidential business by keeping their Internet
activities from being monitored.
Instead of seeing domains that end in .com or .org, these hidden sites end in
.onion
How Tor works?
Examples:
The most infamous of these .onion sites was the now-
defunct Silk Road, an online marketplace where users
can buy drugs, guns and all sorts of other illegal items.
The FBI arrested Ross William Ulbricht who used to run
Silk Road website under the name “Dread Pirate
Roberts”.
Website:
silkroad6ownowfk.onion
Future
 The lines between search engine content and deep web have
begun to blur, as search services start to provide access to
part or all of once-restricted content.
 An increasing amount of deep web content is opening up to
free search as publishers and libraries make agreements with
large search engine.
 In the future, deep web content may be defined less by
opportunity for search than by access fees or other types of
authentication.
Conclusion
 Despite the vast amount of information the Deep Web contains,
it is still an ambiguous part of the digital world.
 Many internet users have not heard of it and believe that what
they see on their Google search results is all that the Web has
to offer.
 Other would rather have it abolished, claiming that it is an
underground world of crime and unethical behavior.
References
• https://en.wikipedia.org/wiki/Deep_web accessed on 19/10/2017
at 21:45.
• https://en.wikipedia.org/wiki/Silk_Road_(marketplace) accessed
on 19/10/2017 at 22:00.
• https://computer.howstuffworks.com/internet/basics/how-
the-deep-web-works5.htm accessed on 19/10/2017 at 22:00.
• https://www.deepweb-sites.com/ accessed on 21/10/2017 at 21:47.
THANK YOU!!

More Related Content

What's hot

Deep web
Deep webDeep web
Deep web
Abu Kaisar
 
The deepweb
The deepwebThe deepweb
The deepweb
ALuna Ryssel
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Bich (Evelyn) Chu
 
Dark wed
Dark wedDark wed
Dark wed
AraVind Pillai
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
Cysinfo Cyber Security Community
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
Paula Ripoll Cacho
 
The Deep Web
The Deep WebThe Deep Web
The Deep Webmartinp
 
Deep Web
Deep WebDeep Web
Deep Web
Ahmed Khan
 
Deep web
Deep webDeep web
The dark web
The dark webThe dark web
The dark webBella M
 
Deep web
Deep webDeep web
Deep web
Manoj Prasad
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
Md. Nazmus Shakib Robin
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
Muhammad Azeem Mazhar
 
The Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to CreepyThe Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to Creepy
Nicholas Davis
 
Deep Web
Deep WebDeep Web
Deep Web
AbishaiDas
 
Deep web
Deep webDeep web
The Dark Web
The Dark WebThe Dark Web
The Dark Web
Suraj Jaundoo
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
Swecha | స్వేచ్ఛ
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
Seth Porter, MA, MLIS
 

What's hot (20)

Deep web
Deep webDeep web
Deep web
 
The deepweb
The deepwebThe deepweb
The deepweb
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
 
Dark wed
Dark wedDark wed
Dark wed
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Deep web
Deep webDeep web
Deep web
 
The dark web
The dark webThe dark web
The dark web
 
Deep web
Deep webDeep web
Deep web
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
The Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to CreepyThe Deep Web -- From Spooky to Creepy
The Deep Web -- From Spooky to Creepy
 
Deep Web
Deep WebDeep Web
Deep Web
 
Deep web
Deep webDeep web
Deep web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 

Similar to Deep web

Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
To Mal
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
Vaishali Misra
 
Deep Web
Deep WebDeep Web
Deep Web
RahulPawar320
 
Darknet
DarknetDarknet
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
IRJET Journal
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
eliofatjon
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
Mohammed Bharmal
 
Darkweb
DarkwebDarkweb
Darkweb
CHANDRESH PAL
 
Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep Web
Nicholas Davis
 
Dark Web
Dark WebDark Web
Dark Web
KunalDas889957
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight IntelliaggGavin O'Toole
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web
Amit Biwaal
 
The Deep Web.pptx
The Deep Web.pptxThe Deep Web.pptx
The Deep Web.pptx
ssuser2f3bcd
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
DEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptx
ismailwinofo
 
Hidden Wiki Darkweb.docx
Hidden Wiki Darkweb.docxHidden Wiki Darkweb.docx
Hidden Wiki Darkweb.docx
cirek63365
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar
 
The Deep Hidden Web
The Deep Hidden WebThe Deep Hidden Web
The Deep Hidden Web
Nicholas Davis
 
Dark Web Sites.pdf
Dark Web Sites.pdfDark Web Sites.pdf
Dark Web Sites.pdf
Vograce
 

Similar to Deep web (20)

Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Darknet
DarknetDarknet
Darknet
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Darkweb
DarkwebDarkweb
Darkweb
 
Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep Web
 
Dark Web
Dark WebDark Web
Dark Web
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web
 
The Deep Web.pptx
The Deep Web.pptxThe Deep Web.pptx
The Deep Web.pptx
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
DEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptx
 
Hidden Wiki Darkweb.docx
Hidden Wiki Darkweb.docxHidden Wiki Darkweb.docx
Hidden Wiki Darkweb.docx
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
The Deep Hidden Web
The Deep Hidden WebThe Deep Hidden Web
The Deep Hidden Web
 
Dark Web Sites.pdf
Dark Web Sites.pdfDark Web Sites.pdf
Dark Web Sites.pdf
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Deep web

  • 2. Internet is divided in two parts: 1. Surface Web (Represents only 4% of all that exists and we know on the internet) 2. Deep Web (Represents 96% remaining) This information is not always available for us. We can found :
  • 3. What is Surface Web? Webpages with static or persistent URLs that can be detected by a search engine crawler. Once detected the URL is added to that search engine’s database and can become a result in a query or search of that search engine.
  • 4. What is Deep Web? The Deep Web is the “hidden” part of the web. Inaccessible to conventional search engines, and consequently, to most users. Sometimes called the “Invisible Web”, includes information contained in searchable databases that can only be reached by a direct query or a specialized search engine. Information is contained in dynamic WebPages that are generated upon request to a database. It has no persistent or static URL.
  • 5. Levels of the Internet and to which belongs the Deep Web 1. Surface Web 2. Bergie Web 3. Deep Web 4. Charter Web 5. Mariana’s Web
  • 6. How to access Deep web ? This place is actually in the internet world, but you cannot access this by using the normal browser, it’s not secure way. If you want to access the deep web , you require to use special software, such as Tor (The Onion Router). Tor is a free open source browser software which uses onion routing process. This browser provides you very secure place. Since this software creates encrypt environment for you, means no one can access your data and not able to see it. In order to use most of the sites on deep web, you must be able to access and browse .onion sites on the Tor network.
  • 7. The Onion Router Tor is software that installs into your browser and sets up the specific connections you need to access Deep Web websites. Critically it is free software for enabling online anonymity and censorship resistance. Onion routing refers to the process of removing encryption layers from Internet communications, similar to peeling back the layers of an onion. Using Tor makes it more difficult to trace Internet activity , including “visits to websites online posts, and other communication forms”, back to user. It is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential business by keeping their Internet activities from being monitored. Instead of seeing domains that end in .com or .org, these hidden sites end in .onion
  • 9. Examples: The most infamous of these .onion sites was the now- defunct Silk Road, an online marketplace where users can buy drugs, guns and all sorts of other illegal items. The FBI arrested Ross William Ulbricht who used to run Silk Road website under the name “Dread Pirate Roberts”. Website: silkroad6ownowfk.onion
  • 10.
  • 11.
  • 12. Future  The lines between search engine content and deep web have begun to blur, as search services start to provide access to part or all of once-restricted content.  An increasing amount of deep web content is opening up to free search as publishers and libraries make agreements with large search engine.  In the future, deep web content may be defined less by opportunity for search than by access fees or other types of authentication.
  • 13. Conclusion  Despite the vast amount of information the Deep Web contains, it is still an ambiguous part of the digital world.  Many internet users have not heard of it and believe that what they see on their Google search results is all that the Web has to offer.  Other would rather have it abolished, claiming that it is an underground world of crime and unethical behavior.
  • 14. References • https://en.wikipedia.org/wiki/Deep_web accessed on 19/10/2017 at 21:45. • https://en.wikipedia.org/wiki/Silk_Road_(marketplace) accessed on 19/10/2017 at 22:00. • https://computer.howstuffworks.com/internet/basics/how- the-deep-web-works5.htm accessed on 19/10/2017 at 22:00. • https://www.deepweb-sites.com/ accessed on 21/10/2017 at 21:47.