

The hacker can take the database and sell it on the darkweb to other parties for their use (more on this soon).The hacker can use the database to attempt to steal identities of the impacted users (You may have names, dates of birth, addresses, and other identifying information in ABCOrganization’s systems).Once they have this database, the risks multiply exponentially. When that malicious actor gets access to ABCOrganization’s information systems, one of the most common targets is the “username and password” database used to control access to ABCOrganization’s website. This financial incentive drives the current cyber-crime environment. The monetary gain represents most compromises – Cybercrime represents more revenue to organized crime than all other forms of crime combined (1). They may have done it for fame and recognition. They might have done so to prove a point and/or strike a blow against ABCOrganization – they wished to cause the company damage.

When someone compromises a website, say “” – they do so with one or more of a set of goals. This information brokerage service is where your concern around the Dark Web resides. The other use is for illicit trade and actions – extortion, sex trafficking, drugs, and the sale of information illegally obtained. There is legitimate transfer of information, interaction, and planning around democratic activities and protests – valid uses of the technology. The Dark Web is a special section of the internet, reachable only with special tools and knowledge, where two main activities take place. This is the truest part of the analogy – as difficult as it is to reach the bottom of the iceberg, so holds true the “Dark Web”. It is at the extreme depths of the ocean and hidden in shadow – difficult to get to. Your email, your bank records, your health information records, company shared data, and other similar items are examples of the “Deep Web”Īt the bottom of the picture, below the purple line, is the bottom “peak” of the iceberg. The Deep web is compromised of access-controlled information – Things behind a “log in” page. This middle section is referred to as the “Deep Web”. The next portion, and vast majority of the iceberg is the middle section, denoted by the space between the yellow and purple lines on the image.
SURFACE WEB DEEP WEB ICEBERG FREE
Your company’s website, google search results, free to view news websites, Wikipedia entries, and other similar items are the “surface web” The Surface Web is exactly as it sounds – it is the content delivered on the surface, viewable to all. Around 5-10% of the iceberg protrudes above the surface, and around 5-10% of the “internet” consists of the “surface web” The “surface web”, or the portion of the iceberg that is above the waterline is an insignificant portion of the iceberg in total. The reason this analogy (shown in this image) is so prevalent, is because it truly is an effective and accurate representation of the internet as it is today (2021). The Dark Web is difficult to define without relying on the famous “think of the internet as an iceberg” analogy. What is the Dark Web, and why should you monitor it?
