Home » Technology » Security » Dark Web: The Internet’s Dark Side
The dark web is a growing concern in the cyber-security space and has been the subject of numerous, recent, crime-related headlines.
For users who access it, the dark web is a part of an anonymous network known as the ‘deep web’. It’s made up of a large assembly of data and domains not accessible through typical search directories such as Google on the ‘surface net’. The dark web and deep web are often confused as being the same thing, though, in reality, the dark web represents just a small portion of the deep web, but one where the majority of cyber-crime-related activities take place.
The dark web is most commonly accessed through ‘Tor’, a web browser that allows users to access websites anonymously, retaining communications between users and web servers on an encrypted network and ‘defending’ them from the various forms of network surveillance that impede true privacy.
This anonymous nature of the dark web has made it an obvious hot spot for a host of malicious and illegal content. Drugs, weapons, illegal pornography and hacking services are among the nefarious bounty on offer. The majority of goods and services are sold on store-like sites, such as the now infamous ‘Silk Road’, and transactions are done using crypto currencies such as bitcoin in order to retain 100% anonymity. With no overriding authority and nothing traceable, criminals and cyber-criminals have found room to stretch within the dark web and are able to put their anonymity to the test.
Accessing the deep/dark web through Tor via an organization’s network can come with severe risk. Though Tor is used as an anonymous and secure service, it can undoubtedly cause damaging exposure to a network and the sensitive information held on it.
Vulnerabilities can be detected in Tor’s ‘exit nodes’ – this is the gateway that will decrypt traffic sent through Tor. Because the dark web is a free-for-all in most cases, an exit node can be used by anyone, and that certain person can access bits of data that is passed through the exit node such as usernames and passwords used in sessions.
Other security risks include the bypassing of network/company security measures which can be illegal and rule-breaking, the risk of malware/botnets attached to files from exit nodes, information theft and even blackmail – these are all not uncommon.
Prevention the key to safety
As is the case with all cyber security related issues, maintaining prevention is far better than being forced to search for a cure. The keys to successful prevention are as follows;
Due to its anonymity and network-switching capabilities, it can be extremely difficult to ensure users are unable to access the dark web via Tor using an organization’s network. However, if the proper measures are put into place, Tor access can be greatly reduced and this preventative action could save networks from, what can be, highly disruptive and damaging exposure.