DEEPWEB

deepweb

Into The Deep Web

Did you know that when you Google “Red Wolves,” Google will only search pages that it has indexed, which is only about four percent of the total World Wide Web (Why Businesses Needs to Understand the Deep Web, 2013). The other ninety-six percent is known as the Deep Web, or Invisible Web. This unknown realm is known for housing terroristic communication, gun and drug trading, assignation bids, and even child pornography. But the Deep Web also holds private files for sharing and storing for business, academic, and personal use. Like typical websites, these pages are still encrypted and decrypted, but typical search engines will not have the websites private key needed to decrypt these pages therefor cannot be indexed.

The Darknet is the specific part of the Deep Web that houses the illegal activity. This is mainly because it is ran by private networks link from peer-to-peer. It is suggested that when exploring this part of the web a user will need use a browser that will keep his/her location anonymous. The Onion Router, or Tor, is an example of such browser. (Tor: Overview, n.d.) How Tor achieves this by bouncing a connected computers IP address, which shows the location of where a user is connecting from, i.e. home, to volunteer nodes where it hides the IP address under many layers, like an onion. Why? Well this is a criminal underworld full of hackers and other cyber criminals.

The Deep Web, as defined in Learning to Crawl the Deep Web, is the portion of the World Wide Web that is not a part of the surface web; in other words, web pages that is not indexed by search engines. Search engines usually use “crawler” to index web pages, following links, and repeat. This will continue until it has a large catalog of the internet. Though a vast majority of pages cannot be accessed by these crawlers. There can be several reasons for this; the page may not be linked, it may have a log-in page which crawlers cannot pass, or because the page may not want to be indexed. Database driven websites are often not indexed which is a problem when a user would like to look up scholarly articles.

There is, after all, different results when you search Google than when you search ASU’s Scholarly Article databases. It is not just Academic databases, but databases that include your bank account, credit cards, and other private or sensitive information you would not want someone to be able just to search via Bing. Cloud computing uses the internet to store and share files for consumers and businesses. These files are also excluded from being indexed and therefor is a part of the deep web. Emails also travel through the World Wide Web, and because crawlers do not have access to private keys, which is needed to decrypt said emails, and cannot be indexed meaning they travel through the Deep Web. You may have been on the Deep Web and not even have known it.

Academic database websites are very useful when conducting research. Problem is a majority is not indexed. These databases are known as the Academic Invisible Web, or AIW. (Lewandowski & Mayr, 2007) When a user wants to do research, they expect, when searching Google or Bing, for that search to be complete and up-to-date Information professional, who gather information from multiple sources and combined search environments have to use over-simplified general search engines that would have a problem obtaining insufficient indexes. (Lewandowski & Mayr, 2007) Google Scholar is an example that can search a fair amount of these academic databases in the Invisible Web, but with questionable quality.

This could be explained several ways, one of which is the mere size of the Deep Web. It is hard to know exactly how big it is and even the best estimates are off. M.K Bergman gives a surface to Deep Web ratio of 1:550. (Lewandowski & Mayr, 2007) He bases it off of the sixty largest academic databases. The issue with this ratio is that these sixty websites contain eighty-five billion total documents totaling 748,504 gigabytes; the first two databases on the list contain 585,400 gigabytes. That is seventy-five percent of total amount of data skewing the results. Bergman investigated further and calculated the mean size of 5.43 million documents making up the Academic Invisible Web. This causes the same problem as before because he uses his same sixty database. The median of the number of documents per academic database is 4950.

DRONES

‘Drones’. The word sends a shiver down the backs of many people, and rightly so. Drones have recently become notorious for their lethal activities in the Middle East, and people are afraid that they will be used at home. In the United States of America, citizens are becoming aware of the increasing use of ‘Unmanned Aerial Vehicles’ by law enforcements agencies...Read more


SOCIAL NETWORK

With the advancement in technology, communication has grown. It is now easier and cheap to communicate and connect with people across the world. The issue of distance is no longer an excuse for lack of communication. Communication systems have grown from wired devices to wireless devices. The internet has also brought adverse changes in the forms of communications that are available and currently being used. It has led the rise of social networks. Here you can communicate and share your thoughts with many people at the same time...Read more


CYBER SECURITY

The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments...Read more


E-COMMERCE

The fast and dramatic changes in information technology specially in last one decade has given new concept of marketing in which buyer and seller do not see each other face to face nor see the goods physically; the whole transaction is carried out with the help of on line communication. The entire deal is carried out with the help of computer telecommunication and net working with associated hardware. In the e-commerceinternet provides information about goods and services...Read more


CLIENTS

Profession is a vocation or an occupation based on an educational training. It also requires a degree in that professional field. For example, teaching is considered to be a profession because it has both an educational training and a degree. The word profession comes from the Latin word 'professio' which means a public declaration with the force of a promise...Read more

HTML Comment Box is loading comments...