Browse Definitions :
Definition

deep web

What is the deep web?

The deep web is an umbrella term for parts of the internet not fully accessible using standard search engines such as Google, Bing and Yahoo. The contents of the deep web range from pages that were not indexed by search engines, paywalled sites, private databases and the dark web.

Every search engine uses bots to crawl the web and add the new content they find to the search engine's index. It isn't known how large the deep web is, but many experts estimate that search engines crawl and index less than 1% of all the content that can be accessed over the internet. The searchable content of the web is referred to as the surface web.

Much of the content of the deep web is legitimate and noncriminal in nature. Deep web content includes email messages, chat messages, private content on social media sites, electronic bank statements, electronic health records (EHR) and other content that is accessible one way or another over the internet.

Any website that is paywalled, such as the text of news articles or educational content site that requires a subscription, is also blocked from search engine bots. Fee-for-service sites like Netflix are also not crawled by the bots.

For that reason, there are some advantages to the deep web. For starters, much of the content on the deep web is irrelevant and would only make searches that much more difficult. And there's also a privacy issue; no one would want Google bots crawling their Netflix viewings or Fidelity Investments account.

Deep web vs. dark web

The terms deep web and dark web are sometimes used interchangeably, but they are not the same. The dark web is a segment of the larger deep web and similarly refers to anything on the internet that is not indexed by and, therefore, accessible via a search engine like Google.

While the deep web is full of legal and legitimate content like paywalled publications, databases and academic journals and research, the dark web is much more disreputable. The dark web is the scene of many illegal activities, including black markets for stolen credit cards and personal information, firearms, malware, prostitution, sex trafficking and drugs. Cyber attack services, like access to botnets that can conduct distributed denial-of-service attacks, are also available.

The dark web is full of illegal marketplaces and forums where criminal activity is advertised and discussed. Some examples include Empire Market, Dream Market and Nightmare Market.

One drug dealing website called Silk Road became so famous it was routinely cited as an example of the dark web in mainstream media reports. Its owner was eventually arrested and sentenced to life in prison with no chance for parole.

The only type of illegal products not found on the major dark web markets is explicit child exploitation material. Pedophiles have their own dark web sites and forums separate from the places where cocaine and credit cards are sold.

NetWalkers dark web site seized by U.S. government
Notorious ransomware perpetrators NetWalkers used a hidden service on the dark web. A joint effort between Bulgarian authorities and the U.S. Department of Justice seized that site early in 2021.

Learn more about the NetWalker ransomware attacks.  

How to access the deep web

Although the deep web's information isn't indexed by regular search engines, it can often still be accessed.

Accessing content on the deep web is relatively safe, and most internet users do it all the time. Logging into Gmail or LinkedIn, or signing in to the Wall Street Journal are just a few examples of accessing data on a deep web site.

User accounts on the deep web contain a lot of personal information that criminals might value -- that's why access to much of the deep web is restricted.

The deep web, including the dark web, will never come to users. Spam and phishing attacks may originate from a dark web marketplace, but a user has to download something infected from that marketplace to release malware. An attack would not originate from the dark web site itself.

The dark web is intentionally hidden and requires specific technologies -- like the Tor browser and the Invisible Internet Project (I2P) network -- to gain access. Both tools have legitimate uses. Tor will protect your IP when visiting websites and I2P is a proxy network that can help journalists reporting from dangerous territories.

how the tor browser works
How the Tor browser works when accessing the deep web

Users cannot access a dark web marketplace without the Tor browser. And while it's based on the Mozilla Firefox browser, Tor is not as well maintained and has page rendering issues.

There is one legitimate reason to peruse the dark web. With all the discussions related to hacking and exploit trading on the dark web, it is a great place to see where yet-unknown vulnerabilities are being discussed. By monitoring the dark web, users might gain the advantage of knowing where exploits are before they become widespread threats.

This was last updated in May 2021

Continue Reading About deep web

Networking
  • network service provider (NSP)

    A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and ...

  • unshielded twisted pair (UTP)

    Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs).

  • WAN optimization (WAN acceleration)

    WAN optimization -- also known as WAN acceleration -- is a collection of technologies and techniques used to improve the ...

Security
  • cardholder data (CD)

    Cardholder data (CD) is any personally identifiable information (PII) associated with a person who has a credit or debit card.

  • PCI DSS merchant levels

    Payment Card Industry Data Security Standard (PCI DSS) merchant levels rank merchants based on their number of transactions per ...

  • three-factor authentication (3FA)

    Three-factor authentication (3FA) is the use of identity-confirming credentials from three separate categories of authentication ...

CIO
  • knowledge-based systems (KBSes)

    Knowledge-based systems (KBSes) are computer programs that use a centralized repository of data known as a knowledge base to ...

  • Sarbanes-Oxley Act

    The Sarbanes-Oxley Act of 2002 is a federal law that established sweeping auditing and financial regulations for public companies.

  • project charter

    A project charter is a formal short document that states a project exists and provides project managers with written authority to...

HRSoftware
  • employee engagement

    Employee engagement is the emotional and professional connection an employee feels toward their organization, colleagues and work.

  • talent pool

    A talent pool is a database of job candidates who have the potential to meet an organization's immediate and long-term needs.

  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

Customer Experience
  • customer touchpoint

    A customer touchpoint is any direct or indirect contact a customer has with a brand.

  • customer service charter

    A customer service charter is a document that outlines how an organization promises to work with its customers along with ...

  • sales development representative (SDR)

    A sales development representative (SDR) is an individual who focuses on prospecting, moving and qualifying leads through the ...

Close