100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

CP373 - Computer Ethics ASSIGNMENT 5 (IN CLASS ASSIGNMENT FILLED)

Rating
-
Sold
-
Pages
4
Uploaded on
30-08-2022
Written in
2021/2022

In class assignment template fully filled out Assignment 5.

Institution
Course








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
August 30, 2022
Number of pages
4
Written in
2021/2022
Type
Other
Person
Unknown

Subjects

Content preview

CP373: Ethics and Professional Practice Qutaiba Albluwi – Winter 2022


A5: Hiding in the Digital Sphere
If you attended both sessions type the following sentence in the white box:
“I certify that I attended both sessions of Module 5”
If you attended only one session type the following sentence:
“I certify that I attended one session of Module 5, which was on <day>”
If you were absent in both sessions, then you cannot submit this report.
I certify that I attended both sessions of Module 5
Notes:
- If you missed the first session (Darkweb), you need to complete all sections in this report
- If you missed the second session (Anonymity), you need to complete section 1 and 2. Do not
complete Section 3

Section 1: The Darkweb

[1] What is the Surface Web? Deep Web? Dark Web?
Surface web is everything that is indexed/easily accessible to anyone through google or
Bing.
Deep web is unindexed, but everything that is open/available.
Dark web is also unindexed, except all connections are encrypted, thus there are
criminal activities that occur on the dark web.
[2] What is “Onion Routing”? Tor Software? SecureDrop Software?
Tor software is a web browser that is used to access the Dark web.
SecureDrop Software is a software that is used within the dark web, primarily used by
journalists to talk with sources within the dark web.
[3] What is the legal status of using Tor Software? Give example of legal and illegal
usages of Tor.
The legal status of using Tor Software, is that it is legal to use it for legal purposes. Using
it to purchase or sell drugs as well as purchase or sell data is still considered to be
illegal.
[4] What are the security advantages and disadvantages of using the software Tor?
- Advantages: Routing is encrypted
- Disadvantages: High risk of malicious code, the government is able to monitor
your use of the Tor Software

1
$8.59
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
dg22
1.0
(1)

Also available in package deal

Get to know the seller

Seller avatar
dg22 Wilfrid Laurier University
Follow You need to be logged in order to follow users or courses
Sold
6
Member since
3 year
Number of followers
2
Documents
31
Last sold
2 weeks ago

1.0

1 reviews

5
0
4
0
3
0
2
0
1
1

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions