The Invisible Areas Of The World Wide Web

Even after more than 20 years of online access, the world is still at the beginning of the Internet revolution. 

Now the importance and influence of digital technology and media has already dwarfed that of television.  The pace of digital change and its impact will continue to accelerate over the next ten years.

 

The Internet: Still in the Early Evolutionary Stages
The Internet has globally transformed data and communications like nothing before. The inventions of the telegraph, telephone, radio, television and computer set the stage for this unprecedented integration of capabilities. The Internet is at once a world-wide broadcasting capability, a mechanism for information dissemination, and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. 

The history of the Internet begins with the development of electronic computers in the 1950s. Initial concepts of wide area networking originated in several computer science laboratories in the United States, United Kingdom, and France. 
The Internet represents one of the most successful examples of the benefits of sustained investment and commitment to research and development of information infrastructure. 

Beginning with the early research in packet switching, the government, industry and academia have been partners in evolving and deploying this exciting new technology. Following the Second World War and lasting through to the late 1980’s, a Cold War was fought between the world’s two superpowers, the United States and the now defunct Union of Soviet Socialist Republics. 

While military build ups, political sparring, and diplomatic manoeuvring were the most obvious activities, there were also many spin-off effects into other areas including some nearer and dearer to the heart of librarians and documentarists, such as research and education. For example, the Soviet Union’s jump-start of the space race with the launch of the Sputnik satellite in 1957 sparked a dedicated effort in the United States to boost scientific research. Academic and research libraries, by and large, became beneficiaries of the government largesse that resulted from this “knowledge race.” 

Collections boomed in order to keep up with the production of scientific literature. In order to control the resulting surge in bibliographical data, computers were enlisted to process the information then published as print or microfilmed indexes, and which subsequently would be transformed into databases accessible through the large host services that sprang up in the early 1970s 

This Internet now includes the World Wide Web which includes both the Deep Web and the Dark Web.
The Dark Web has a sinister, even foreboding, reputation for good reason. People go to the Dark Web to anonymously buy illegal narcotics, even to see child pornography.  Terrorists use the dark web to hide and organise. There are libraries of pirated books and music on the dark web. If the internet is an online world of towns and cities, then the dark web is the red-light districts, the hideouts of criminals and all the other dark alleys and criminal enterprises that exist the underground economy.

Nevertheless, the dark web is growing. More than growing, before long it will change the Internet as we know it.
Now okay, with that opening you might be picturing a darkness descending, pushing out the light of the Internet. In your head might be scenes reminiscent of a modern Batman movie as some villain takes over Gotham by shutting out the lights.
The thing is there is a lot more to the dark web than villains of every type.

The dark web is simply the portion of the Internet that can only be accessed on darknet, overlay networks that require specific software, configurations or authorisation to access.  The dark web is only a small part of the deep web, as the “deep web” is the portion of the Internet not indexed by web search engines.

Basically, the dark web is comprised of small peer-to-peer networks and larger and growing dark web networks like Tor, Freenet and I2P. The Tor portion of the dark web requires someone to download free software to be used as a browser. 
The name “Tor” comes from an acronym for the original software project name “The Onion Router.” Tor simply directs Internet traffic through a free, worldwide, volunteer overlay network. Round and around your signal goes in thousands of relays in an unknown sequence. This conceals your IP address and location.

The dark web then is certainly used by criminals, but it is increasingly also being used by individuals in countries that ban access to certain parts of the Internet, or that even hunt down and arrest people who say certain things or communicate with political dissidents.

The dark web is also being used by people in freer nations who simply are tired of their Internet traffic being watched and monetized by corporations. Some people would also rather not have their Google searches used against them in the future. Many aren’t interested in criminal behavior, but just have a penchant for privacy from government surveillance or the corporate world.

For more information: please read Cyber Security Intelligence’s book Easy Cyber Knowledge

Medium:           DigitalCenter

You Might Also Read:

Going To The Dark Web:

 

 

« Cyber Attacks On Africa Are Soaring
Few Businesses Are Ready For California’s New Consumer Data Privacy Law »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Yubico

Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.

General Dynamics Information Technology (GDIT)

General Dynamics Information Technology (GDIT)

General Dynamics IT delivers cyber security services to defend critical information and infrastructure.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

UKAS

UKAS

UKAS is the national accreditation body for the UK. The directory of members provides details of organisations offering certification services for ISO 27001.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

DeepFactor

DeepFactor

DeepFactor is the industry’s first Continuous Observability platform enabling Engineering and AppSec teams to find and triage RUNTIME security, privacy, and compliance risks in your applications.

Clearnetwork

Clearnetwork

Clearnetwork specializes in managed cybersecurity solutions that enable both public and private organizations improve their security posture affordably.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

GO Business

GO Business

GO Business are a specialised B2B team within GO that caters to the communication needs of the local business community in Malta.

Velaspan

Velaspan

Velaspan design, deploy, and manage enterprise wireless networks and cybersecurity solutions for leading businesses and brands.