Best practices in creating a vulnerability assessment programme: Measure twice and cut once, avoiding costly mistakes
Christopher Cowen
Cyber Security: A Peer-Reviewed Journal, 2018, vol. 2, issue 2, 114-121
Abstract:
This paper has two goals. The first is to help define the Dark Web and how it fits into the larger World Wide Web (WWW); secondly, to understand the Dark Web’s dangers and how to avoid the landmines contained therein. This paper utilises open source material to break down the three parts to the WWW: Surface Web, Deep Web and Dark Web. The paper views all three areas as distinctly important within our modern society, with the caveat that due caution needs to be exercised before exploring the second two areas of the Deep Web and the Dark Web. It’s important for security researchers to have a good understanding of these areas in order to protect organisations, as well as themselves, from potential cyber exploitation.
Keywords: dark web; deep web; surface web; Tor (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2018
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/1112/download/ (application/pdf)
https://hstalks.com/article/1112/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2018:v:2:i:2:p:114-121
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().