DEEP WEB – HIDDEN WEB. WHAT WE DON'T KNOW ABOUT ON THE INTERNET OR WHAT IS WELL HIDDEN FROM US
DOI:
https://doi.org/10.31618/nas.2413-5291.2021.1.71.471Keywords:
Deep Web, Internet, TOR, DarkNet, content, information security, information technologies, cyberspace, cyberwarfare.Abstract
In this article, the study of the Deep Web – "Deep Web" is carried out. The article examines the way how this network appeared and spread, considers its positive and negative sides, studies such issues as: the concept, types, forms and characteristics, as well as compares it with the hidden Internet and the "black Internet" (DarkNet) and suggests methods of personal information security.
References
Uzdenov R.M. «Novye granicy kiberprestupnosti» // Vserossijskij kriminologicheskij zhurnal. 2016. [Elektronnyj resurs]. – URL: https://cyberleninka.ru/article/n/novye-granitsykiberprestupnosti (data obrasheniya: 03.09.2021).
Mezhdunarodnyj kongress po kiberbezopasnosti «International Cybersecurity Congress» (2018). 05.07.2018. Moskva, Centr mezhdunarodnoj torgovli, Kongress-centr.
Tumoyan E.P., Anikeev M.V. «Setevoe obnaruzhenie passivnyh skrytyh kanalov peredachi dannyh v protokole TCP/IP // Informacionnoe protivodejstvie ugrozam terrorizma». 2006.
Kokoulin A. N., Andreev R. A., Badrtdinov A. S., Feofilova P. A.-«Analysis of problems of using the tor system-Technical Sciences - from theory to practice». 2015.
Kolokolova V.I. «Ogranichenie dostupa k sajtam v seti «Internet», soderzhashimi zapreshyonnuyu informaciyu – Sovremennye nauchnye issledovaniya i innovacii». 2016.
Sushkova Yu. A., Merkulova M. S. «Kiberucheniya. Problemy rossijskogo Interneta». Elektronnyj vestnik Rostovskogo socialno-ekonomicheskogo instituta. 2015.
Agranovskij A.V. «Sovremennye anonimnye seti v elektronnoj kommercii» // Izvestiya vysshih uchebnyh zavedenij. SeveroKavkazskij region. Seriya: Tehnicheskie nauki. 2003.
Borodakiy Yu. V., Dobrodeev A. Yu., Butusov I. V. «Cybersecurity as the main factor of national and international security of the XXI century» (Part 1) // Cybersecurity issues. 2013.
Nishanov R. sh. «On the issue of possible criminalization of the spread of Tor technologiesActual problems of the relationship between criminal law and the process-Collection of materials of the allRussian scientific and practical conference with international participation». 2016.
Lekalo I. A. «Using anonymous networks to protect the Internet traffic of employees of the organization. In the book: New information technologies Abstracts of the XX International student conference-school-seminar». MIEM. Moscow, 2012.
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
CC BY-ND
A work licensed in this way allows the following:
1. The freedom to use and perform the work: The licensee must be allowed to make any use, private or public, of the work.
2. The freedom to study the work and apply the information: The licensee must be allowed to examine the work and to use the knowledge gained from the work in any way. The license may not, for example, restrict "reverse engineering."
2. The freedom to redistribute copies: Copies may be sold, swapped or given away for free, in the same form as the original.