Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Read through the case student and respond to the questions isted. 1. What infrastructure components are most important for the providing the surface web to

Read through the case student and respond to the questions isted.

1. What infrastructure components are most important for the providing the surface web to the public users of the internet?

2. Should more effor be extended to enable wider access to the dark web? Why or Why not?

3. What are the impications of the dark web for individuals? Companies? Governments?

image text in transcribed
CASE 2 The Dark Web Most people don't think too much about the only available to those authorized by the Edward Snowden, who used it to evade NSA web as long as they are able to visit their owner of the system to view or access. watchdogs. favorite websites. Popular websites like There is also a vast amount of unlawful This high level of privacy within Tor nytimes.com reside on what is called the sur- content on the deep web, and this content is allows people to conduct a wide range of face web-meaning that they display content referred to as the dark web. Interest in the confidential activities. Some use it for sensi- that a search engine like Bing, DuckDuckGo, dark web has been on the rise following sev- tive communications, including political dis- or Google can find when you are searching eral high-profile data leaks that have been sent. But in the past decade, it's also become the web. In addition to the surface web, there extensively discussed in the media. For a hub for illicit markets that sell or distribute is a vast amount of non-indexed content that example, in April 2020 cyber criminals sold weapons, drugs, stolen credit cards, illegal cannot be found with a normal search engine. 267 million Facebook user profiles on the pornography, pirated media, and more. You This non-indexed content is collectively dark web for a bargain price of only US$540. can even hire assassins. It is important to referred to as the deep web. The deep web is Content on the dark web is arranged in a spe- note, however, that Tor was initially created many times larger than the surface web. It cial way to provide anonymity to those who by researchers supported by the U.S. govern- has been suggested that the internet can be browse and share content. As such, you can- ment's Defense Advanced Research Projects visualized as a giant iceberg of information, not access the dark web with a normal web Agency, or DARPA, as a tool for fostering with the content of the surface web being browser. The most popular part of the dark democracy in repressive regimes. So, while relatively smaller and visible and the deep web is called Tor. To access Tor, you need a the dark web has many nefarious uses, it also web having a massive amount of content that special version of the Firefox browser. Tor, has great value in many parts of the world is unseen by search engines and is typically an acronym of The Onion Router, directs where free expression is outlawed. more difficult to find and navigate. internet traffic through a worldwide volun- Because of the noted difficulties in The deep web contains a variety of con- teer network of relays and virtual tunnels searching and accessing the massive dark tent, both lawful and unlawful. Lawful con- (rather than the usual direct connections to web, very little has been done to make it tent that resides on the deep web includes internet sites)-each representing a layer of more accessible to the general public. Given corporate and academic databases that can- the onion. These relays allow users to con- the tremendous infrastructure resources not be found with a search engine but can be ceal their location or usage from anyone con- required to search just the surface web, it is viewed with a normal browser. The deep ducting network surveillance or traffic difficult to imagine the technologies, hard- web also houses content from mainstream analysis and are intended to protect the per- ware, and software that would be required to websites, like Facebook posts that are only sonal privacy of users. There are additional allow the same search capabilities in the dark visible to a poster's friends or transaction ways to further increase your anonymity on web. And given the nefarious nature of much data that you provide to Amazon when plac- Tor by utilizing an operating system focused of the dark web's content, perhaps society is ing an order. All of this lawful content on security, such as the Linux-based operat- better off making it difficult for most to navi- resides on the deep web, and much of it is ing systems Tails that was made famous by gate and utilize its content. Questions 3-49. What infrastructure components are most important for providing the surface web to the public users of the inter- net? 3-50. Should more effort be expended to enable wider access to the dark web? Why or why not? 3-51. What are the implications of the dark web for individuals? Companies? Governments

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Project Management A Managerial Approach

Authors: Jack R. Meredith, Samuel J. Mantel,

7th Edition

470226218, 978-0470226216

More Books

Students also viewed these General Management questions

Question

LO6.1 Discuss price elasticity of demand and how it is calculated.

Answered: 1 week ago