Dark Web Investigation
Intro -- Foreword -- Acknowledgements -- Contents -- Editor Biographies -- Contributors -- Part I: Foundations -- Chapter 1: Understanding the Dark Web -- 1.1 Introduction -- 1.2 Infrastructure of the Dark Web -- 1.2.1 The Tor Project (Tor): Overview -- 1.2.1.1 Search Engines and Introductory Points...
Contributors: | ; ; ; |
---|---|
Format: | Electronic Book |
Language: | English |
Published: |
Cham
Springer
2021]
|
In: | Year: 2021 |
Online Access: |
Volltext (lizenzpflichtig) |
Check availability: | HBZ Gateway |
Subito Delivery Service: | Order now. |
Keywords: | |
Parallel Edition: | Erscheint auch als: 9783030553425 |
Summary: | Intro -- Foreword -- Acknowledgements -- Contents -- Editor Biographies -- Contributors -- Part I: Foundations -- Chapter 1: Understanding the Dark Web -- 1.1 Introduction -- 1.2 Infrastructure of the Dark Web -- 1.2.1 The Tor Project (Tor): Overview -- 1.2.1.1 Search Engines and Introductory Points -- 1.2.2 Tor Architecture and Routing -- 1.2.2.1 Tor Nodes -- 1.2.2.2 Tor Directory Authorities -- 1.2.2.3 Tor Circuit -- 1.2.2.4 Setting Up Tor -- 1.2.3 The Invisible Internet Project (I2P): Overview -- 1.2.4 I2P Network Database -- 1.2.5 I2P Routers and Tunnels -- 1.2.6 Freenet: Overview -- 1.2.6.1 Freenet's Architecture and Design -- 1.2.6.2 Sharing, Requesting and Accessing Data -- 1.3 Law Enforcement Agency Investigating the Dark Web -- 1.3.1 How Policing the Clear Web Influences the Dark Web -- 1.3.2 The Dark Web Also Poses a "Policing Dilemma" -- 1.4 Concluding Remarks -- References -- Chapter 2: Using the Dark Web -- 2.1 Introduction -- 2.2 Dark Web Users -- 2.2.1 Non-criminal Actors -- 2.2.1.1 Public-Ordinary Users -- 2.2.1.2 Journalists -- 2.2.1.3 Activists -- 2.2.1.4 Businesses and IT Industry -- 2.2.1.5 Law Enforcement Agencies -- 2.2.2 Criminal Actors -- 2.2.2.1 Cybercriminals -- 2.2.2.2 Hacktivists -- 2.2.2.3 Black Hat Hackers and Virus-Hacking Tool Coders -- 2.2.2.4 State-Sponsored Attackers -- 2.2.2.5 Trade and Service Providers and Buyers -- 2.2.2.6 Insider Threat -- 2.2.2.7 Cyberterrorists -- 2.3 Concluding Remarks -- References -- Chapter 3: Terrorist Activities in the Dark and the Surface Web -- 3.1 Introduction -- 3.2 Terrorist's Activities on the Web -- 3.2.1 Propaganda -- 3.2.2 Propaganda and Social Media -- 3.2.3 Propaganda and Dark Web -- 3.2.4 Content of Propaganda -- 3.2.5 Rhetorical Structures of Terrorist Websites -- 3.2.6 Crime as a Service -- 3.2.7 Communications. |
---|---|
Item Description: | Description based on publisher supplied metadata and other sources |
Physical Description: | 1 Online-Ressource (xvii, 288 Seiten) |
ISBN: | 9783030553432 |