SlideShare a Scribd company logo
Montilla K32 - DEEP WEB


The Deep Web consists of Web content that is not
part of the surface web



It contains pages that are not and cannot be
indexed by standard search engines
(Google, Yahoo!, Bing, etc.)



Network of anonymous users that make use of their
anonymity to conduct business and store content
that is either illegal or of no interest to majority of
internet users



Special software (TOR, Freenet, etc.) is required in
order for internet users to gain access to and make
use of the deep web


Public information on the Deep Web is currently 400
to 550 times larger than the commonly defined World
Wide Web



The Deep Web contains 7,500 terabytes of
information compared to 19 terabytes of information
in the surface web



Contains nearly 550 billion individual documents
compared to 1 billion documents in the surface web



Deep Web currently has more than 200,000 websites



The Deep Web is currently the largest growing
category of new information on the Internet


Total quality content of the Deep Web is 1,000 to
2,000 times greater than that of the surface web



Deep Web content is highly relevant to every
information need and market



More than half of the Deep Web content resides in
topic-specific databases



95% of the Deep Web is publicly accessible
information that is not subject to any fees or
subscriptions



Deep Web has a large community of hackers,
scientists, drug dealers, assassins, perverts, terrorists,
kidnappers, data miners, and others


The Deep Web makes E-Commerce a possibility for
individuals and businesses that engage in illegal activity,
much in the same way the legit businesses are making
use of E-Commerce



E-Commerce is practiced by the following individuals
- murderers/hit men
- drug dealers
- rapists/child molesters
- spies
- ammunitions/weapons dealers
- terrorists


The Deep Web will effectively put E-Commerce in a
negative light



Focus will be placed on the disadvantages of
technology instead of the benefits



Will raise issues of legitimacy in E-Commerce



Could potentially force the government and other
monitoring bodies to violate privacy rights of legitimate
E-commerce users for the sake of security
(passwords, private information, confidential financial
data/records/transactions will be accessed)


The Deep Web will continue
to grow and expand in the
next 2 years, and long after



Governments won’t be able
to do anything significant to
control it



The Deep Web will continue
to gain more power and
popularity amongst ECommerce practitioners


Developments in advanced
technology will improve tracking
on the dark net, but anonymity
will prove to be users’ greatest
asset



Struggling businesses will
consider moving to the deep
web to carry out more
unrestricted and unmonitored
operations that will increase
revenue



Occasional successful busts of
illegal activity in the Deep Web

More Related Content

PPTX
Dark web
PPTX
Digital law pwpt with zach
PPTX
Cyer crimes and cyber laws b.v.raghunandan
PPTX
Digital law
PPT
#DCI11 Access to Information
PPTX
It legislation
PPTX
Digital law powerpoint
PPTX
Digital law
Dark web
Digital law pwpt with zach
Cyer crimes and cyber laws b.v.raghunandan
Digital law
#DCI11 Access to Information
It legislation
Digital law powerpoint
Digital law

What's hot (20)

PPT
Cyber law1
DOC
Cyber-Law and Cyber-Crime
PDF
Misuse of computer
PPTX
Cybercrime law in the philippines
PPTX
Privacy and Freedom of Expression
PPT
Hass & Associates Online Reviews
DOCX
Aceptable use policy user guidelines
DOCX
Smartphone Encryption and the FBI Demystified
PDF
66 keith kupferschmid_presentation
PPTX
The securitization of online activism
PPTX
Ways of Misusing The Computer System
PPTX
Multimedia digital piracy
PDF
Wikileaks, Hactivism, and Government: An Information War
PPTX
2014’s biggest winners and losers in privacy and security
PPTX
legal aspects in e marketing
PPTX
After 9 11
PDF
The Philippine Cybercrime Prevention Act of 2012
PDF
The CFAA and Aarons Law
PDF
KEY
Chapter 10, part 3
Cyber law1
Cyber-Law and Cyber-Crime
Misuse of computer
Cybercrime law in the philippines
Privacy and Freedom of Expression
Hass & Associates Online Reviews
Aceptable use policy user guidelines
Smartphone Encryption and the FBI Demystified
66 keith kupferschmid_presentation
The securitization of online activism
Ways of Misusing The Computer System
Multimedia digital piracy
Wikileaks, Hactivism, and Government: An Information War
2014’s biggest winners and losers in privacy and security
legal aspects in e marketing
After 9 11
The Philippine Cybercrime Prevention Act of 2012
The CFAA and Aarons Law
Chapter 10, part 3
Ad

Viewers also liked (10)

PPTX
Pivot stratégique
DOC
Respiration (basic biology) unm
PDF
Lucro-Arbitrado-ligue (11)98950-3543
PDF
CV Mats Heuzen
PPTX
Suzi presentation
PPTX
The deepweb
PPTX
The Deep Web
PPTX
Plan audit achat
PDF
Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...
DOCX
audit des stocks
Pivot stratégique
Respiration (basic biology) unm
Lucro-Arbitrado-ligue (11)98950-3543
CV Mats Heuzen
Suzi presentation
The deepweb
The Deep Web
Plan audit achat
Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...
audit des stocks
Ad

Similar to Montilla K32 - DEEP WEB (20)

PPTX
Ali shahbazi khojasteh - deep web
PPTX
PDF
Wp below the_surface
PPTX
Dark web presentation
PPTX
Invisible Web
PPT
Polinter11
PPTX
PptDW.pptxvbbbvvvxxfjjrtuhvcfhhjddffcvjjgg
PPTX
The Internet and World Wide Web
PPTX
Cyber crime- a case study
PPTX
The Deep Web.pptx
PPTX
Cyber Crime Challanges
PPTX
PDF
Dw communication
PPTX
Dark Web.pptx
PDF
The Dark web - Why the hidden part of the web is even more dangerous?
PPTX
Deep web
PPTX
unit-1.pptx
PDF
PPTX
60_484_7734-CYBER-ETHICS-ppt-slides.pptx
PDF
Cyber Law & Forensics
Ali shahbazi khojasteh - deep web
Wp below the_surface
Dark web presentation
Invisible Web
Polinter11
PptDW.pptxvbbbvvvxxfjjrtuhvcfhhjddffcvjjgg
The Internet and World Wide Web
Cyber crime- a case study
The Deep Web.pptx
Cyber Crime Challanges
Dw communication
Dark Web.pptx
The Dark web - Why the hidden part of the web is even more dangerous?
Deep web
unit-1.pptx
60_484_7734-CYBER-ETHICS-ppt-slides.pptx
Cyber Law & Forensics

Recently uploaded (20)

PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPT
Data mining for business intelligence ch04 sharda
PDF
WRN_Investor_Presentation_August 2025.pdf
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PPTX
Amazon (Business Studies) management studies
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
Types of control:Qualitative vs Quantitative
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
MSPs in 10 Words - Created by US MSP Network
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PDF
Unit 1 Cost Accounting - Cost sheet
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Data mining for business intelligence ch04 sharda
WRN_Investor_Presentation_August 2025.pdf
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Amazon (Business Studies) management studies
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
unit 1 COST ACCOUNTING AND COST SHEET
Types of control:Qualitative vs Quantitative
COST SHEET- Tender and Quotation unit 2.pdf
Deliverable file - Regulatory guideline analysis.pdf
MSPs in 10 Words - Created by US MSP Network
Ôn tập tiếng anh trong kinh doanh nâng cao
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
Unit 1 Cost Accounting - Cost sheet
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
HR Introduction Slide (1).pptx on hr intro
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Roadmap Map-digital Banking feature MB,IB,AB
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...

Montilla K32 - DEEP WEB

  • 2.  The Deep Web consists of Web content that is not part of the surface web  It contains pages that are not and cannot be indexed by standard search engines (Google, Yahoo!, Bing, etc.)  Network of anonymous users that make use of their anonymity to conduct business and store content that is either illegal or of no interest to majority of internet users  Special software (TOR, Freenet, etc.) is required in order for internet users to gain access to and make use of the deep web
  • 3.  Public information on the Deep Web is currently 400 to 550 times larger than the commonly defined World Wide Web  The Deep Web contains 7,500 terabytes of information compared to 19 terabytes of information in the surface web  Contains nearly 550 billion individual documents compared to 1 billion documents in the surface web  Deep Web currently has more than 200,000 websites  The Deep Web is currently the largest growing category of new information on the Internet
  • 4.  Total quality content of the Deep Web is 1,000 to 2,000 times greater than that of the surface web  Deep Web content is highly relevant to every information need and market  More than half of the Deep Web content resides in topic-specific databases  95% of the Deep Web is publicly accessible information that is not subject to any fees or subscriptions  Deep Web has a large community of hackers, scientists, drug dealers, assassins, perverts, terrorists, kidnappers, data miners, and others
  • 5.  The Deep Web makes E-Commerce a possibility for individuals and businesses that engage in illegal activity, much in the same way the legit businesses are making use of E-Commerce  E-Commerce is practiced by the following individuals - murderers/hit men - drug dealers - rapists/child molesters - spies - ammunitions/weapons dealers - terrorists
  • 6.  The Deep Web will effectively put E-Commerce in a negative light  Focus will be placed on the disadvantages of technology instead of the benefits  Will raise issues of legitimacy in E-Commerce  Could potentially force the government and other monitoring bodies to violate privacy rights of legitimate E-commerce users for the sake of security (passwords, private information, confidential financial data/records/transactions will be accessed)
  • 7.  The Deep Web will continue to grow and expand in the next 2 years, and long after  Governments won’t be able to do anything significant to control it  The Deep Web will continue to gain more power and popularity amongst ECommerce practitioners
  • 8.  Developments in advanced technology will improve tracking on the dark net, but anonymity will prove to be users’ greatest asset  Struggling businesses will consider moving to the deep web to carry out more unrestricted and unmonitored operations that will increase revenue  Occasional successful busts of illegal activity in the Deep Web

Editor's Notes

  • #3: The Deep Web is often referred to as “The Silk Road”, named after the ancient trade routes that ran all across Eurasia.References:http://www.youtube.com/watch?v=wMgqTWdk3tw
  • #4: An analogy that is typically used to describe the surface web and the deep web is an iceberg – where the surface web is the tip of the iceberg or the portion that is clearly and easily visible, and the deep web is the LARGER portion of the iceberg underwater that is not visible to most internet users.References:http://www.youtube.com/watch?v=wMgqTWdk3tw
  • #5: Not all of the information found in the Deep Web is illegal or illicit. The Deep Web also contains massive archives of old documents of large corporations that is of no use to them anymore and that the general public doesn’t care about.References:http://www.youtube.com/watch?v=wMgqTWdk3tw