The Invisible Areas Of The World Wide Web

Even after more than 20 years of online access, the world is still at the beginning of the Internet revolution. 

Now the importance and influence of digital technology and media has already dwarfed that of television.  The pace of digital change and its impact will continue to accelerate over the next ten years.

 

The Internet: Still in the Early Evolutionary Stages
The Internet has globally transformed data and communications like nothing before. The inventions of the telegraph, telephone, radio, television and computer set the stage for this unprecedented integration of capabilities. The Internet is at once a world-wide broadcasting capability, a mechanism for information dissemination, and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. 

The history of the Internet begins with the development of electronic computers in the 1950s. Initial concepts of wide area networking originated in several computer science laboratories in the United States, United Kingdom, and France. 
The Internet represents one of the most successful examples of the benefits of sustained investment and commitment to research and development of information infrastructure. 

Beginning with the early research in packet switching, the government, industry and academia have been partners in evolving and deploying this exciting new technology. Following the Second World War and lasting through to the late 1980’s, a Cold War was fought between the world’s two superpowers, the United States and the now defunct Union of Soviet Socialist Republics. 

While military build ups, political sparring, and diplomatic manoeuvring were the most obvious activities, there were also many spin-off effects into other areas including some nearer and dearer to the heart of librarians and documentarists, such as research and education. For example, the Soviet Union’s jump-start of the space race with the launch of the Sputnik satellite in 1957 sparked a dedicated effort in the United States to boost scientific research. Academic and research libraries, by and large, became beneficiaries of the government largesse that resulted from this “knowledge race.” 

Collections boomed in order to keep up with the production of scientific literature. In order to control the resulting surge in bibliographical data, computers were enlisted to process the information then published as print or microfilmed indexes, and which subsequently would be transformed into databases accessible through the large host services that sprang up in the early 1970s 

This Internet now includes the World Wide Web which includes both the Deep Web and the Dark Web.
The Dark Web has a sinister, even foreboding, reputation for good reason. People go to the Dark Web to anonymously buy illegal narcotics, even to see child pornography.  Terrorists use the dark web to hide and organise. There are libraries of pirated books and music on the dark web. If the internet is an online world of towns and cities, then the dark web is the red-light districts, the hideouts of criminals and all the other dark alleys and criminal enterprises that exist the underground economy.

Nevertheless, the dark web is growing. More than growing, before long it will change the Internet as we know it.
Now okay, with that opening you might be picturing a darkness descending, pushing out the light of the Internet. In your head might be scenes reminiscent of a modern Batman movie as some villain takes over Gotham by shutting out the lights.
The thing is there is a lot more to the dark web than villains of every type.

The dark web is simply the portion of the Internet that can only be accessed on darknet, overlay networks that require specific software, configurations or authorisation to access.  The dark web is only a small part of the deep web, as the “deep web” is the portion of the Internet not indexed by web search engines.

Basically, the dark web is comprised of small peer-to-peer networks and larger and growing dark web networks like Tor, Freenet and I2P. The Tor portion of the dark web requires someone to download free software to be used as a browser. 
The name “Tor” comes from an acronym for the original software project name “The Onion Router.” Tor simply directs Internet traffic through a free, worldwide, volunteer overlay network. Round and around your signal goes in thousands of relays in an unknown sequence. This conceals your IP address and location.

The dark web then is certainly used by criminals, but it is increasingly also being used by individuals in countries that ban access to certain parts of the Internet, or that even hunt down and arrest people who say certain things or communicate with political dissidents.

The dark web is also being used by people in freer nations who simply are tired of their Internet traffic being watched and monetized by corporations. Some people would also rather not have their Google searches used against them in the future. Many aren’t interested in criminal behavior, but just have a penchant for privacy from government surveillance or the corporate world.

For more information: please read Cyber Security Intelligence’s book Easy Cyber Knowledge

Medium:           DigitalCenter

You Might Also Read:

Going To The Dark Web:

 

 

« Cyber Attacks On Africa Are Soaring
Few Businesses Are Ready For California’s New Consumer Data Privacy Law »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clearpath Solutions Group

Clearpath Solutions Group

Clearpath Solutions Group expertise covers virtualization and data storage technologies, networking, security and cloud computing.

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

Guidewire

Guidewire

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

DeepCyber

DeepCyber

DeepCyber supports its customers, with an “intelligence-driven” approach, to improve their proactive detection and response "capability" of cyber threats.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub is a non-profit network organization focused on cooperation, information sharing, research and implementation of cutting-edge technologies in cybersecurity.

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

Dectar

Dectar

Dectar (formerly 4Securitas) is a cybersecurity company that provides solutions that predict, detect, defend and react against cybersecurity threats.

NoviFlow

NoviFlow

NoviFlow is a leading provider of terabit networking software solutions for Communication Service Providers (CSPs).

ABPGroup

ABPGroup

ABPGroup is Asia’s leading cybersecurity technology provider focusing on providing best-of-breed solutions that address today’s pressing challenges.

Synersoft BLACKbox

Synersoft BLACKbox

Synersoft, the maker of path-breaking and disruptive technology for SMEs, now branded as BLACKbox, is an incubated and invested portfolio company of CIIE - IIM-Ahmedabad.

Amiosec

Amiosec

Amiosec is a British cyber innovation business specialising in delivering simple-to-use solutions to the complex problems of the modern world.