ABSTRACT

This introduction presents an overview of the key concepts discussed in the subsequent chapters of this book. This book provides an overview of emerging digital threats and computer crimes, and focuses on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. It explores how dark web crimes are conducted on the surface web in new mediums, such as internet of things and peer-to-peer file sharing systems. The book deals with the fundamentals of dark web along with explaining the threat landscape of dark net. It introduces the Tor browser, which is used to access the dark web ecosystem. The dark web is an internet content that exists in the World Wide Web ecosystem but is only accessible through specific software/browser. The anonymity around dark web paves way to plenty of illegal activities leading to cyberattacks. Having a sound knowledge around dark web will act as an important skill for cybersecurity professionals.