THE INTERNET by Rajesh Karki


 THE INTERNET

In modern days, the internet does not require any introduction as it already has become the essential part of our daily life. From childhood to old age, everyone is bound to the internet as it has become the companion for providing information, education, knowledge, entertainment, and many more.  The Internet has narrowed the world as we can explore and connect to any parts of the world in just a click. Every day the content on the internet is increasing, so does the requirement for the internet speed. By the definition, “Internet is a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.”

Little things that most people know are there are different levels of Internet. The Internet is divided into three parts commonly known as Surface Web, Deep Web, and the Dark Web. The extensive amount of information that we are accessing or surfing on the Internet are mostly from the surface web like browsing, searching, reading the news, online shopping, and social media. It is a surprising fact that the Surface Web owns only 5% of the Internet. But if we try to explore more of the information there is already more data adding on the web which also makes it almost impossible to access all the information during our lifetime.

 The Deep Web refers to parts of the internet not accessible using standard search engines, such as paywalled sites, email messages and private databases. Unknowingly, we are also accessing the Deep Web using the messaging system having end to end encryption, chat messages, private content on social media sites, electronic bank statements, electronic health records and other content that is accessible one way or another over the Internet. Surprisingly, the Deep Web which cannot be directly accessed using the standard search engines owns 90% of the Internet. Most of the government and the organization uses the Deep Web for the safe transmission of data and information to prevent intrusion and hacking along with maintaining privacy.

The Dark Web refers to encrypted online content that is not indexed by conventional search engines which own 5% of the Internet. The Dark Web cannot be accessed using the normal browser and can be accessed with specific browsers, such as TOR browser. The webpages in the dark web has the domain like .onion instead of .com,.org,.gov etc. The Dark Web was created by two research organizations in the US Department of Defense to develop an anonymized and encrypted network that would protect the sensitive communications of US spies. The secret network would not be known or accessible to ordinary internet surfers. While the Surface web uses the shortest path in the network to transmit the data, the Dark web uses the long and complex route to transmit the data so that the data cannot be accessed by anyone except the sender and receiver. But now we know the Dark Web for bad reasons as 90 percent of the dark web contains illegal contents and is full of scammers and hackers. The illegal activities like child pornography, dealing drugs, sales of forbidden weapons and other activities have become a part of the dark web.

Since there are lots of defaulters in the dark web and exploring the dark web can be one of the risky ideas, as hackers are in search of their prey for scamming. It is also suggested not to try to explore the dark web which might result in the hazardous situation as there are numerous reports of people who have become the victims. Although there are mostly negative sides to the Dark Web, the people who do not have the right to speak freely in their country can express themselves and share the secret information using the platform.

There are lots of ways to use the Internet for different purposes. Everyone should follow the ethical aspect of the Internet and should use it wisely to gain information, increase knowledge, explore the world, express talents, and increase productivity which brings positive change in the society.

                                                                                                        Prepared by: Rajesh Karki

Department Of Computer Science

Post a Comment

0 Comments