Professional Documents
Culture Documents
Research Project Assignment: Dark Web
Research Project Assignment: Dark Web
Research Project Assignment: Dark Web
Question
Task:In this assessment, you are required to provide a complete report of your research
project, that you chose in Assessment 3 (Research Project Abstract) by discussing the
following aspects:
The purpose of the research project assignment on the dark web is to understand how
the unauthorized access of users to the deep web can have serious consequences which
are not only restricted to the virtual reality. Various challenges arise in this online setting
that need to be managed effectively so that the high level of risks and uncertainties
associated with the dark web can be managed in a better way. There is the need for a
robust security system so that the vulnerability of the internet user can be minimized to a
certain extent and their exposure before the cyber attackers and hackers can be handled
effectively. With the advent of the technology, the dark web is a humongous issue that
needs to be resolved on priority. The research project assignment would help to capture
the main security aspects that can be strengthened to minimize the risks associated with
the dark web.
Keywords: Dark web, surface web, deep web, malware, Tor, illegal
Literature Review: Areas addressed & not addressed and Critical Issues
The authors have covered the meaning and details around dark web in the research
work. The architecture of the dark web consists of three phases in which the queries are
placed in the first phase, form identification, filling, and submission is done in the
second phase, and results are displayed in the last phase. The authors have also
addressed the details of the Tor browser which is used to access the dark web sites. The
comparison between the surface web and dark web is also covered along with the
statistics around the latter. There are currently over 200,000 dark web sites that exist.
There are six levels that exist on the web and the dark web is present at the fourth level.
The authors have also addressed the legal activities that can be carried out on this
section of the web. However, they have not addressed the mechanisms that may be used
to prevent the illegal activities and security concerns (Patel, Shankar and Patel, 2017).
The authors have conducted research on the negative impacts of the dark web on
internet governance and cyber security. The authors have covered the cybercrimes that
occur in dark web as illegal selling of drugs and exotic animals. Silk Road is a
marketplace that is used for such activities on the dark web. Stolen goods & information,
murder, gambling, terrorism, illegal financial exchanges, hacktivism, and arms
trafficking are some of the other illegal tasks that are executed. The authors have covered
the mechanisms that need to be used to monitor the dark web. Customer data
monitoring, use of distributed hash tables, social site monitoring, hidden service
monitoring, marketplace profiling, and semantic analysis are some of the areas that are
addressed (Chertoff & Simon, 2015). A strong and guaranteed mechanism to prevent the
malicious activities on the dark web is still not discovered. It is one of the critical issues
that need to be addressed.
Dark web is a part of deep web in which there are illegal activities carried out. The
authors have described the legal and illegal activities that take place in deep web. There
are hidden services executed on the dark web in which the user identity is kept
anonymous. Hidden Wiki is one of the sites which are used to access the services on the
dark web. Adoption research database is one of the databases that are used (Hawkins,
2016). Silk Road is an online marketplace that is used by the users on the dark web to
sell drugs, malware, etc. The author has addressed the issues and concerns around the
dark web and the elements that are associated with the same. However, the mechanisms
that may be followed to address these concerns are not covered and addressed in the
research work.
Exploration of the deep web is the topic of research for the authors in the research work.
A comparison between surface web and deep web, and dark web and deep web has been
presented in the research. Malware trade is one of the major issues associated with the
deep web and it is conducted in the dark web section. VAWTRAK is a banking Trojan
that is spread to the users and their systems through phishing emails. CryptoLocker is a
ransomware that is also emerged out of the dark web (Frediani, 2016). Exchange of illicit
drugs is done using the dark web. Law enforcement on the deep web is not easy as
everything is already encrypted. Attribution and fluctuation are the two other properties
that make it difficult to enforce and develop laws around these activities. Security
vendors and the end-users need to be made aware of the dark web and the practices that
they may follow to prevent such issues.
The authors have addressed the explanation of the deep web by covering the five
modules as URLs acquisition, indexing, page scouting, enrichment, and qualitative plus
quantitative analytics. The authors have covered the issues around deep web in terms of
the illegal activities that are executed. Passports and citizenships are put on sale by
creating fake identities and documents. There are stolen accounts of the users that are
also put on sale. There are hitman-for-hire and assassination services that are carried
out on the dark web. These issues have been addressed in the research work (Balduzzi
and Ciancaglini, 2018). However, the primary need is to come up with the mechanisms
to control and avoid the risks.
The author has directed research on the negative effects of the dark web on web
administration and digital security. The creators have secured the cybercrimes that
happen in dark web as illicit offering of medications and intriguing creatures. Silk Road
is a commercial centre that is utilized for such exercises on the dark web. Stolen
merchandise and data, kill, betting, psychological warfare, unlawful money related
trades, hacktivism, and arms trafficking are a portion of the other illicit undertakings
that are executed. The creators have secured the components that should be utilized to
screen the dark web. Client information observing, utilization of conveyed hash tables,
social site checking, shrouded benefit checking, commercial centre profiling, and
semantic examination are a portion of the territories that are tended to (Finklea, 2017).
A solid and ensured system to keep the malevolent exercises on the dark web is as yet not
found. It is one of the basic issues that should be tended to.
Dark web has emerged as one of the primary matters of concern. The author has covered
the history of the activities carried out on the dark web to determine the level of
governance and security controls that are needed. The details of the laws enforced
around the dark web can provide an understanding on the policies that would be
successful. The role of the government is extremely critical for controlling the illegal
activities on the dark web and the area has been explored by the author. The set of most
appropriate methods that can be used have also been illustrated by the author (Chertoff,
2017). The critical areas and issues that need to be addressed include the illegal selling
and exchange of malware, drugs, and other goods, hacktivism, assassination, and
terrorism.
Conclusion
Dark web has led to the conduction of illegal tasks and activities that need to be
controlled and prevented. The majority of the research work that is done in this area is in
the exploration of the issues associated with dark web. However, little has been
published on the improvement and correction measures that shall be adopted to put a
check on the illegal activities. There are technical advancements that are being done that
shall be explored to understand the prevention and control measures. The use of
governance to control the activities would also be essential. The research project
assignments are being prepared by our IT assignment help experts from top universities
which let us to provide you a reliable assignment help online service.
References
Balduzzi, M. and Ciancaglini, V. (2018). Cybercrime in the Deep Web. [online]
Blackhat.com. Available at: https://www.blackhat.com/docs/eu-15/materials/eu-15-
Balduzzi-Cybercrmine-In-The-Deep-Web-wp.pdf [Accessed 17 Sep. 2018].