Book Image

Hands-On Dark Web Analysis

By : Sion Retzkin
Book Image

Hands-On Dark Web Analysis

By: Sion Retzkin

Overview of this book

The overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization. This book will initially introduce you to the concept of the Deep Web and the Dark Web and their significance in the security sector. Then we will deep dive into installing operating systems and Tor Browser for privacy, security and anonymity while accessing them. During the course of the book, we will also share some best practices which will be useful in using the tools for best effect. By the end of this book, you will have hands-on experience working with the Deep Web and the Dark Web for security analysis
Table of Contents (18 chapters)
Title Page
About Packt
Contributors
Preface
Index

Business companies


Many organizations create security-breach information repositories (clearinghouses) to collect information about breaches and breach attempts. Then they correlate the information and try to detect patterns or definitive information, which will allow them to better protect themselves, mitigate risk, and alert internal security teams, or even similar companies, to these attacks.

Also, these repositories are prime targets for attackers, so managing them on the Dark Web provides protection from detection and exfiltration of the information and their source IPs.

Organizations that are employee-focused use the Dark Web as a place in which employees can report to management on irresponsible or illegal activity performed inside the organization, without fear of repercussion.

Many companies also have analysts who monitor various websites for information that can help them. Naturally, they don't want their competitors to detect what they're watching (to prevent industrial espionage...