CyberSecurity Day 01 to 100: DAY 03 | World of the internet.

Albus Security
14 min readJun 25, 2023

Welcome back, esteemed security enthusiasts! We are thrilled to announce that the Cyber Security Day 01 To 100 Day Series is officially underway. Today, we embark on the second day of this series, offering you an incredible opportunity to enhance your understanding of security. Our carefully curated program aims to provide you with a comprehensive grasp of the concepts and practical knowledge required in the field of cybersecurity. I’m Prakrati Khatri, your guide for today’s article. Together, we will explore the vast and captivating realms of the internet. If you have any questions about this series, feel free to ask. We are here to provide you with all the information you need. Let’s dive into this exciting journey!

Sure! Let’s dive into the fascinating world of the internet and how it works.

What is the Internet?

So, what exactly is the Internet? Well, think of it as a vast network of interconnected computers spread all over the world. It’s like a gigantic web that links together billions of devices, from your smartphones and laptops to massive data centers and servers.

At the heart of this network are Internet Service Providers (ISPs), which provide you with access to the Internet. When you connect your device to the internet, whether through Wi-Fi or a cable, your ISP becomes your gateway to the online world.

Now, when you type a website address into your browser, let’s say “www.example.com," a remarkable process begins. Your browser sends a request to a Domain Name System (DNS) server to find the IP address associated with that particular domain. IP addresses are unique numerical identifiers assigned to each device connected to the internet. The DNS server replies with the IP address, and your browser can then establish a connection.

To ensure that your request reaches the correct destination, it is broken down into smaller packets of data. These packets travel across the internet, hopping from one router to another, until they reach the server hosting the website you want to access. Each router acts as a traffic controller, directing the packets along the most efficient path to their destination.

Once the packets arrive at the server, they are reassembled, and the requested webpage is sent back to your device in the same packetized manner. Your browser then reconstructs the webpage from the received packets and presents it to you as a fully functional website. All this happens in a matter of milliseconds, thanks to the incredible speed and efficiency of the internet infrastructure.

Of course, security is crucial on the internet. Encryption technologies, like SSL/TLS, ensure that your data remains private and protected as it travels through the network. This is especially important when you’re transmitting sensitive information like passwords or credit card details.

So, there you have it! The internet is like a global superhighway connecting computers and devices worldwide, enabling us to share information, communicate, and explore the vast online universe. It’s a technological marvel that has revolutionized the way we live, work, and connect with each other. So, next time you browse the web, remember the incredible journey your data takes to bring the digital world to your fingertips. Cheers to the power of the internet!

How Internet came?

As we travel back in time to explore the captivating story of how the internet came to be. It all began in the late 1960s, during a period known as the Cold War when the United States government wanted to create a robust and resilient communication network. This network would be designed to withstand potential attacks and ensure the secure exchange of information, even in the face of catastrophic events.

The U.S. Department of Defense’s Advanced Research Projects Agency (ARPA) took up the challenge and initiated a project called ARPANET. The goal was to connect computers at various research institutions, allowing them to share data and resources. In 1969, ARPANET made history by establishing the first-ever network connection between computers located at the University of California, Los Angeles (UCLA) and Stanford Research Institute (SRI). This milestone marked the birth of the internet.

Over the years, the internet evolved and expanded. More institutions joined the network, and the technology behind it continued to advance. In the 1970s, a team led by Vinton Cerf and Robert Kahn developed the Transmission Control Protocol (TCP) and the Internet Protocol (IP), commonly known as TCP/IP. These protocols laid the foundation for how data is transmitted and routed across the internet.

In the 1980s, the National Science Foundation (NSF) in the United States played a significant role in the development of the Internet by establishing a network called NSFNET. This network connected supercomputing centers and academic institutions across the country, effectively expanding the reach of the Internet.

As the 1990s rolled in, the internet experienced a transformative moment with the invention of the World Wide Web by Sir Tim Berners-Lee. The web brought a user-friendly interface and made it easier for people to navigate and access information on the internet. This breakthrough led to explosive growth in web development and online services, shaping the internet into what we know today.

The commercialization of the Internet accelerated in the late 1990s, with the advent of Internet service providers (ISPs) offering dial-up and broadband connections to homes and businesses. This widespread access to the internet-fueled its exponential growth and laid the groundwork for the digital revolution that followed.

From humble beginnings as a research project, the internet has grown into a global phenomenon that connects billions of people around the world. It has revolutionized communication, commerce, education, entertainment, and countless other aspects of our lives. The collaborative efforts of researchers, engineers, and visionaries from across the globe have made the Internet what it is today — an indispensable part of our modern society.

So, my friends, next time you surf the web, remember the remarkable journey that brought the internet into existence. It’s a testament to human ingenuity and our endless quest to connect and share knowledge with one another.

HTTP Client and Server

First, let’s talk about HTTP, which stands for Hypertext Transfer Protocol. It’s the foundation of how data is transferred over the World Wide Web. Whenever you type a website address into your browser, like “www.example.com," your browser acts as an HTTP client. It sends a request to the server hosting that website, asking for the webpage you want to see.

Now, picture the server as a friendly host who receives your request with open arms. It understands the HTTP protocol and knows how to respond to your browser’s request. The server prepares a response that includes the requested webpage, and it’s ready to send it back to you.

But how does this communication happen? Well, the HTTP client and server use a back-and-forth conversation called a “request-response cycle.” Your browser initiates the cycle by sending an HTTP request to the server. This request includes important information, such as the type of request (e.g., GET, POST, or PUT) and the specific webpage or resource you’re asking for.

The server, being the accommodating host it is, receives your request and understands what you’re looking for. It fetches the requested webpage or resource and bundles it up into an HTTP response. This response contains the requested content along with a status code, which informs the client if the request was successful or if there was an error.

Now, here’s where the magic happens! The server sends the HTTP response back to your browser, and your browser receives it with excitement. It unpacks the response and starts rendering the webpage for you to see. The content, images, and interactive elements all come together, creating a visually appealing and interactive web page.

This entire process occurs seamlessly and quickly, thanks to the behind-the-scenes teamwork of the HTTP client and server. They follow the rules and guidelines of the HTTP protocol to ensure smooth communication and efficient delivery of web content.

Keep in mind that the HTTP client and server can be implemented in various ways, using different programming languages and technologies. However, the fundamental principles remain the same: the client initiates the request, and the server responds with the requested content.

So, my dear friends, the next time you browse the web, remember the dynamic interplay between the HTTP client and server, working hand in hand to bring you the digital wonders of the internet.

Browsers

A browser is like a window to the internet, allowing you to access websites, watch videos, read articles, and more. Examples of popular browsers are Google Chrome, Mozilla Firefox, Safari, and Microsoft Edge. When you want to book a hotel room, you open your browser and either type the hotel’s website address or search for it. The browser uses a technology called HTTP to communicate with the server hosting the hotel’s website.

The server acts like a helpful hotel concierge. It receives your request through the HTTP protocol, understands that you’re looking for information about available rooms, and prepares to respond with the requested webpage. To know which webpage to send back, your browser includes a unique identifier called a URL in the request. The URL specifies the specific webpage or resource you’re requesting, such as “www.examplehotel.com/rooms." The server analyzes the URL and fetches the corresponding webpage to send back to your browser. Once the server has prepared the response, your browser receives it eagerly. The response includes the requested webpage, relevant information, and a status code indicating the success or failure of the request. Your browser then unpacks the response, interprets the HTML, CSS, and JavaScript code embedded in the webpage, and starts rendering the content. HTML provides the structure, CSS adds visual style, and JavaScript adds interactivity. Your browser processes images, videos, and other multimedia elements, ensuring they’re displayed correctly. It also executes JavaScript code, enabling interactive features like form submissions and animations. As your browser works its magic, it arranges all webpage elements, resizes images, adjusts layouts, and ensures a responsive experience across devices.

Your browser also handles user interactions. Clicking on links, filling out forms, or navigating through pages triggers new requests to the server for content retrieval. Throughout this process, your browser prioritizes security. It implements measures like encryption and warnings to protect you from malicious websites and safeguard your data. Behind the scenes, servers play a crucial role in delivering web content. They store, process, and deliver web resources, handle requests, and run applications. Servers come in various forms, such as dedicated physical machines or virtualized instances hosted in data centers.

Servers host websites, store webpages, images, and videos, and execute server-side scripts for dynamic content generation. Web server software like Apache, Nginx, and Microsoft IIS manage incoming requests and ensure efficient delivery of webpages and resources to your browser.

The Internet is full of information. Everyone read content according to their interest and gain information. The Internet is made up of billions of devices connected together and sharing information all over the world. Big amount of people doesn’t know that the internet is divided into three categories. These are the Surface web, Deep web, and dark web. We have already covered the common basics, so now let’s see how the internet is divided. Let’s get started

Surface Web

The surface web, also known as the visible web or indexed web, is the part of the internet that is easily accessible and discoverable by search engines. It’s like the tip of an iceberg drifting in the extended ocean of the internet. When we talk about the surface web, we’re referring to all the websites and web pages that we regularly visit for information, entertainment, shopping, and more.

Think of the surface web as a bustling city, filled with countless websites waiting to be discovered. It encompasses a wide range of digital destinations, including news portals, social media platforms, online marketplaces, educational resources, blogs, and forums, among others. These websites cater to various interests and provide a wealth of information and services to users. To access the surface web, we rely on web browsers such as Chrome, Firefox, or Safari. With just a few clicks, we can explore a myriad of websites by typing in a web address or using a search engine to find specific information. Behind the scenes, the surface web is built upon a foundation of technologies such as HTML (Hypertext Markup Language), CSS (Cascading Style Sheets), and JavaScript. These coding languages enable web developers to create visually appealing and interactive websites that engage and captivate visitors.

It’s important to note that the surface web represents only a fraction of the entire internet. Estimates suggest that it comprises approximately 4% of the total content available. The remaining 96% is often referred to as the deep web or the dark web, which we’ll explore in another discussion.
One of the defining characteristics of the surface web is its visibility to search engines. When we search for information using search engines like Google, Bing, or Yahoo, the results primarily come from the surface web. Search engines continuously crawl and index web pages, making them easily discoverable and accessible to users worldwide.

However, it’s crucial to exercise caution and practice good digital hygiene when navigating the surface web. Not all websites are trustworthy, and there is a possibility of encountering scams, misinformation, or malicious content. Being vigilant, verifying the credibility of sources, and employing safe browsing practices are essential to ensure a secure and reliable online experience

Deep Web

The Deep web, sometimes referred to as the invisible web or hidden web, is a vast and often misunderstood part of the internet. To better understand it, imagine the internet as an iceberg. The surface web, which we commonly access through search engines, represents only a small portion of the iceberg visible above the water. The deep web, on the other hand, encompasses the massive portion hidden beneath the surface. What exactly resides in the deep web? It includes various types of content that search engines can’t easily index or access. This includes private databases, academic research repositories, scientific journals, government records, subscription-based content, corporate intranets, and more. These resources often require specific credentials like usernames, passwords, or subscriptions to gain access.

It’s important to note that the deep web is not naturally illegal. In fact, a significant portion of it consists of legitimate and valuable information that may not be publicly accessible due to privacy concerns or intellectual property rights. For example, sensitive research studies or personal medical records may be stored in the deep web to ensure restricted access and protect confidentiality.

However, it’s crucial to be aware that the deep web can also harbor illegal activities and malicious content, similar to the dark web. The deep web itself is not synonymous with criminal activities, but it’s important to approach it with caution and skepticism, just as we would with any other online platform. To access the deep web, specialized search engines and tools are often required. These tools help users navigate through password-protected websites, online databases, and other hidden content. However, it’s essential to note that not all deep web content is easily accessible or legal to access. Some examples of the deep web, Ex- Confidential research studies and unpublished scientific papers., Subscription-based content like premium news articles and academic journals.Companies' Private Documents, Private Forums, and Communities

Now Let’s dive into interesting things that is the most dangerous part of the internet where normal people can’t survive because there was illegal things happening like hacking, murder, drugs, etc

Dark Web

The dark web is a hidden part of the internet that exists beyond the reach of traditional search engines. It is like an underground market, shrouded in secrecy and requiring specific software and configurations to access. This encrypted and anonymous space is known for maintaining a wide range of websites, communities, and activities, both legitimate and illegal.
First, it’s important to clarify that the dark web is not naturally alarming or malicious. While it does provide a haven for illegal activities, it also serves as a platform for legitimate purposes. Whistleblowers, journalists, activists, and individuals seeking privacy may use the dark web to communicate and share information securely, away from prying eyes.

Accessing the dark web requires specialized software, the most well-known being Tor (The Onion Router). Tor routes internet traffic through a series of volunteer-operated servers, bouncing it around the world and encrypting it at each step. This complex network of relays ensures anonymity, making it difficult to trace users’ identities and locations.
Within the dark web, there are hidden services represented by websites with addresses ending in the “.onion” domain. These websites are not indexed by search engines and are often protected by additional layers of encryption. They can host a wide range of content, including online forums, marketplaces, databases, wikis, and even social networks.

Now, let’s address the darker side of the dark web. This clandestine realm indeed harbors illegal activities. Illegal goods, such as drugs, firearms, stolen data, counterfeit currencies, and hacking tools, may be sold on dark web marketplaces. Cybercriminals may also offer hacking services, engage in identity theft, distribute malware, or carry out other malicious activities. It’s crucial to emphasize that participating in or supporting illegal activities is both unethical and illegal.

However, it’s important to note that law enforcement agencies actively monitor and investigate criminal activities on the dark web. They employ various techniques, including infiltration and data analysis, to identify and apprehend individuals involved in illicit operations. These efforts aim to ensure a safer online environment for everyone and hold perpetrators accountable.

While the dark web may captivate curiosity, it is vital to approach it with caution and skepticism. Engaging with unknown websites or individuals can pose significant risks, including exposure to scams, malware, or compromising personal information. It’s essential to exercise discernment and adhere to strict security practices when navigating this obscure realm.

Safety Guidelines Tips

  1. Use a VPN to encrypt your traffic and mask your IP address.
  2. Exert alert when using public networks.
  3. Maintain your software up to date to protect against known vulnerabilities.
  4. Practice good browsing habits, avoiding unknown links and downloads.
  5. Use strong, unique passwords and consider a password manager.
  6. Be mindful of your online footprint.

Accessing the Dark Web

  1. Install Tor: Download and install the Tor browser from the official website (https://www.torproject.org/).
  2. Configure Tor: Open the Tor browser and follow the setup process to connect to the Tor network and ensure anonymous browsing.
  3. Find Dark Web Websites: Enter a dark web directory or search engine, like the Hidden Wiki (http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion), to discover links to various dark web sites. Alternatively, search for specific .onion addresses through indexed search engines.
  4. Exercise Caution: Be aware of the risks and avoid illegal or unethical activities. Use caution when accessing unfamiliar websites and interacting with unknown individuals.

Expert Advice: Do not attempt to access the dark web (illegible websites) if you are a complete beginner. Engaging with the dark web without sufficient knowledge and experience can lead to harmful consequences. This article is intended solely for educational purposes, and it should not be taken as an encouragement to explore the dark web. We cannot be held responsible for any negative outcomes or actions resulting from attempting to access the dark web.

If you want to learn more about the dark web, seek out legitimate educational resources and join cybersecurity communities to gain knowledge from experts. Remember to prioritize online security and adhere to legal and ethical boundaries.

Stay with us as we delve into a series of interconnected articles that will offer valuable insights and deepen your understanding. Just like this Day 03 article, we aim to keep you engaged, and the upcoming articles will be just as captivating. Enjoy your learning journey and embrace the exciting challenges that await. Happy exploring, and until next time

--

--