{"id":71782,"date":"2025-07-08T19:01:01","date_gmt":"2025-07-08T22:01:01","guid":{"rendered":"https:\/\/a3aengenharia.com\/en-us\/content\/technical-articles\/what-is-the-deep-web\/"},"modified":"2026-04-26T21:24:57","modified_gmt":"2026-04-27T00:24:57","slug":"what-is-the-deep-web","status":"publish","type":"articles","link":"https:\/\/a3aengenharia.com\/en-us\/content\/technical-articles\/what-is-the-deep-web\/","title":{"rendered":"Deep Web: Technical Foundations, Architecture, Protocols, and Security"},"content":{"rendered":"\n<p><strong>The Deep Web<\/strong> represents a fundamental and strategic layer of the architecture of networks and web systems. It includes all content, data, and systems <strong>not indexed by traditional search engines<\/strong>, meaning everything beyond the reach of conventional browsers and search tools such as Google.<\/p>\n\n\n\n<p>The Deep Web covers everything from information accessible only through authentication, paywalled content, and isolated pages without public links, to dynamic data generated by applications and institutional portals. Its operation involves specific requirements related to protocols, credentials, and advanced security policies.<\/p>\n\n\n\n<p>For professionals in engineering, networking, telecommunications, and information security, <strong>understanding the Deep Web universe is essential<\/strong> to ensure privacy, anonymity, and the protection of strategic data. The challenges range from logical segmentation of environments to the adoption of sound security practices, making it necessary to master normative approaches, continuous updating, and effective risk mitigation policies.<\/p>\n\n\n\n<p><strong>In this article<\/strong>, we discuss the <strong>technical foundations of the Deep Web<\/strong>, its architecture, access protocols, web segmentation, integration with network infrastructures, security implications, associated threats, and recommendations for protecting systems and data. The goal is to provide a comprehensive perspective aligned with engineering best practices and regulatory standards, aimed at professionals seeking solid references for decision-making, project integration, and risk mitigation.<\/p>\n\n\n\n<p>Let&#8217;s dive in.<\/p>\n\n\n<p>[elementor-template id=&#8221;24446&#8243;]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is the Deep Web? Technical Foundations and Applications<\/h2>\n\n\n\n<p>The <strong><em>Deep Web is the entire portion of the internet that is not indexed by search engines<\/em><\/strong> such as Google or Bing. It includes internal databases, corporate systems, academic portals, and pages that require authentication or restricted access. In other words, it is made up of protected content that is not openly accessible to the general public.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/a3aengenharia.com\/wp-content\/uploads\/2025\/07\/Deep-Web-banner-683x1024.webp\" alt=\"Institutional banner representing the concept of the Deep Web, with internet layers, corporate examples, and digital security visual elements. Produced by A3A Engenharia de Sistemas.\" class=\"wp-image-31759\" style=\"width:600px\" srcset=\"https:\/\/a3aengenharia.com\/wp-content\/uploads\/2025\/07\/Deep-Web-banner-683x1024.webp 683w, https:\/\/a3aengenharia.com\/wp-content\/uploads\/2025\/07\/Deep-Web-banner-341x512.webp 341w, https:\/\/a3aengenharia.com\/wp-content\/uploads\/2025\/07\/Deep-Web-banner-768x1152.webp 768w, https:\/\/a3aengenharia.com\/wp-content\/uploads\/2025\/07\/Deep-Web-banner.webp 1024w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><figcaption class=\"wp-element-caption\"><strong>Figure 1 &#8211; Deep Web: architecture and security<\/strong><br>Institutional technical illustration highlighting the concept of the Deep Web, its layers, corporate examples, and digital protection elements.<br><em>Source: A3A Engenharia de Sistemas.<\/em><\/figcaption><\/figure>\n\n\n\n<p>The Deep Web is composed of all digital resources, information, and services that are not indexed by conventional search engines.<\/p>\n\n\n\n<p>This includes dynamic content generated by applications, protected databases, institutional portals accessible only through authentication, paywalled services, standalone pages without external links, non-HTML content, and multi-level files available only with proper credentials.<\/p>\n\n\n\n<p>The growth and diversification of this infrastructure accompany the maturation of internet architecture, maintaining areas that are intentionally or accidentally hidden from public indexers.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Dynamic Content:<\/strong> Generated in real time through database queries or application interfaces.<\/li>\n\n\n\n<li><strong>Confidential Documents and Data:<\/strong> Stored in corporate, academic, or government repositories and requiring strong authentication.<\/li>\n\n\n\n<li><strong>Isolated Pages:<\/strong> Resources without public hyperlinks, making automated indexing difficult.<\/li>\n\n\n\n<li><strong>Paywalled Content:<\/strong> Access conditioned on payment or subscription, deliberately restricting indexation.<\/li>\n<\/ul>\n\n\n\n<p>Contrary to common misconceptions, the Deep Web is not synonymous with criminal or illicit infrastructure. That classification is closer to the so-called Dark Web, which is a specific subset of deep infrastructure, accessed through anonymising protocols and commonly associated with clandestine flows.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p style=\"padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\"><strong>&#8220;The Deep Web is not a dark territory, but rather the universe of strategic data and internal systems that sustain companies, universities, and public institutions. True digital security begins with rigorous management of these non-indexed environments, ensuring privacy, compliance, and operational resilience.&#8221;<\/strong><br><em>Altair Galvao, Electrical Engineer, Head of A3A Engenharia de Sistemas<\/em><\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\">How Does Deep Web Architecture Work and What Are Its Layers?<\/h2>\n\n\n\n<figure class=\"wp-block-table aligncenter\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Characteristic<\/strong><\/th><th><strong>Surface Web<\/strong><\/th><th><strong>Deep Web<\/strong><\/th><th><strong>Dark Web<\/strong><\/th><\/tr><\/thead><tbody><tr><td><strong>Visibility<\/strong><\/td><td>Indexed by search engines (Google, Bing, etc.)<\/td><td>Not indexed by search engines<\/td><td>Not indexed, restricted and anonymised access<\/td><\/tr><tr><td><strong>Access<\/strong><\/td><td>Public and unrestricted through traditional browsers<\/td><td>Restricted: login, authentication, paywall, specific configurations<\/td><\/tr><tr><td>Only through dedicated software (e.g. Tor, I2P)<\/td><td><\/td><td><\/td><td><\/td><\/tr><tr><td><strong>Content<\/strong><\/td><td>Institutional websites, public portals, blogs, news<\/td><td>Internal databases, intranets, corporate platforms<\/td><td>Anonymous marketplaces, forums, whistleblowing channels<\/td><\/tr><tr><td><strong>Level of Anonymity<\/strong><\/td><td>No<\/td><td>Variable, according to access controls<\/td><td>High, architecture designed for anonymity and secrecy<\/td><\/tr><tr><td><strong>Legality<\/strong><\/td><td>Fully legal<\/td><td>Legal, except in cases of illicit use<\/td><td>Depends on use and accessed content<\/td><\/tr><tr><td><strong>Examples<\/strong><\/td><td><a href=\"http:\/\/www.a3aengenharia.com.br\/\">www.a3aengenharia.com.br<\/a>, official public websites<\/td><td>A3A Engenharia intranet, banking systems, academic environments<\/td><td>.onion addresses, anonymous communication services<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\"><strong>Figure &#8211; Comparative table of web layers:<\/strong> Institutional comparison between the Surface Web, Deep Web, and Dark Web, highlighting visibility, access, anonymity, and real technical examples.<br><em>Source: A3A Engenharia de Sistemas.<\/em><\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40)\">Segmentation Model<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Surface Web:<\/strong> Composed of pages indexed by search engines such as Google. It uses standard HTTP\/HTTPS protocols and refers to open access.<\/li>\n\n\n\n<li><strong>Deep Web:<\/strong> A layer of non-indexed resources that may include everything from internal corporate systems to academic databases. Access normally depends on authentication, authorisation, and differentiated transport protocols.<\/li>\n\n\n\n<li><strong>Dark Web:<\/strong> An even more restricted subset, accessed with specialised browsers such as Tor, using its own addressing and encryption mechanisms to provide extreme anonymity.<\/li>\n<\/ul>\n\n\n\n<p>The segmentation model aims to define levels of visibility, accessibility, and privacy according to the logical and physical architecture of information systems. The technical distinction is based on a functional contrast: while the Surface Web is characterised by exposure and indexability, the Deep Web is defined by the opposite characteristics.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Access Structures<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Authenticated Request:<\/strong> Requires credentials validated by authentication servers.<\/li>\n\n\n\n<li><strong>Dynamic Content Generation:<\/strong> Data displayed through queries that depend on time-based parameters, filters, and access policies.<\/li>\n\n\n\n<li><strong>Logical Isolation:<\/strong> Pages, files, and services without explicit links in the open hyperlink structure.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Deep Web Protocols and Infrastructure: How to Access Securely?<\/h2>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/a3aengenharia.com\/wp-content\/uploads\/2025\/07\/gif-Deep-Web-1024x683.webp\" alt=\"Comparative GIF showing the access flow from the Surface Web to the Deep Web, including browser, login screen, paywall, padlock, and database, using A3A Engenharia de Sistemas visual identity.\" class=\"wp-image-31764\" style=\"width:600px\" srcset=\"https:\/\/a3aengenharia.com\/wp-content\/uploads\/2025\/07\/gif-Deep-Web-1024x683.webp 1024w, https:\/\/a3aengenharia.com\/wp-content\/uploads\/2025\/07\/gif-Deep-Web-512x341.webp 512w, https:\/\/a3aengenharia.com\/wp-content\/uploads\/2025\/07\/gif-Deep-Web-768x512.webp 768w, https:\/\/a3aengenharia.com\/wp-content\/uploads\/2025\/07\/gif-Deep-Web.webp 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Figure 3 &#8211; Animated comparison between Surface Web access and Deep Web access: visually demonstrates how access evolves from a common browser to systems protected by login, paywall, and authentication, highlighting the security and control typical of the Deep Web.<br><em>Source: A3A Engenharia de Sistemas.<\/em><\/figcaption><\/figure>\n\n\n\n<p style=\"padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\">Deep Web operations involve application-layer protocols, secure transport, segmented routing, and integration with robust authentication and authorisation systems. Structures such as VLANs, corporate VPNs, virtual private networks, and access-control systems based on multi-factor authentication (MFA) sustain much of the traffic and access to these environments.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Protocols:<\/strong> HTTP\/HTTPS, SOCKS5 (especially in anonymising environments), TLS for encrypted transport, and specific ports for hidden services.<\/li>\n\n\n\n<li><strong>Routing:<\/strong> Integration of private and public backbones using advanced logical and physical segmentation mechanisms, structured cabling compliant with technical standards, and strict management of external network interfaces through secure demarcation points.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Typical Topologies<\/h3>\n\n\n\n<p>The network architecture of the Deep Web usually comprises external network interfaces, protected entry infrastructure, and segregated access channels. Physical interconnection points follow structured cabling technical standards, including aerial routes, underground cabling, inspection boxes, and mechanical protection methods to prevent interception or sabotage.<\/p>\n\n\n\n<p>In corporate environments, integration of the Deep Web with public networks is carried out in a segmented way through advanced firewalls, intrusion-prevention systems, persistent access-control lists, and federated authentication, ensuring secure interoperability without undue exposure of sensitive data.<\/p>\n\n\n\n<p>Deep Web data-protection best practices follow internationally recognised recommendations such as <strong>ISO\/IEC 27001<\/strong> (Information Security Management), <strong>ISO\/IEC 27002<\/strong> (Security Controls), and <strong>ISO\/IEC 27005<\/strong> (Risk Management). These standards guide continuous updating policies, the use of advanced encryption, and segmented access controls, all of which are essential for non-indexed environments.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Risks, Threats, and Privacy in the Deep Web: How to Protect Yourself?<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Threats and Risk Vectors<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Interception:<\/strong> Deep Web traffic, if not properly encrypted, may be targeted by sniffing, compromising sensitive information.<\/li>\n\n\n\n<li><strong>Spoofing:<\/strong> Risks of fraudulent operations simulating legitimate entities, leading to unauthorised acquisition of credentials or data.<\/li>\n\n\n\n<li><strong>Attacks on Authenticated Systems:<\/strong> Attempts to exploit vulnerabilities in authentication and authorisation mechanisms.<\/li>\n\n\n\n<li><strong>Malware and Remote Exploitation:<\/strong> Environments with poor update controls become targets for malicious actors seeking escalated compromise.<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#x26a0;&#xfe0f; <strong>Attention:<\/strong><br>Unauthorised access to or exposure of data within corporate Deep Web systems can result in serious legal risks, information leakage, and operational impact for companies.<\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"padding-top:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40)\">Protection Technologies<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Use end-to-end encryption across all communication segments, including TLS and digital certificates issued by trusted certification authorities.<\/li>\n\n\n\n<li>Deploy next-generation firewalls with deep packet inspection and context-based policies.<\/li>\n\n\n\n<li>Adopt multi-factor authentication and least-privilege access control.<\/li>\n\n\n\n<li>Continuously update software, firmware, and applications, combined with active vulnerability management.<\/li>\n\n\n\n<li>Monitor network traffic in real time to identify and mitigate anomalous activities.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Anonymity, Privacy, and Ethical Considerations<\/h3>\n\n\n\n<p>The Deep Web, by providing non-traceable access mechanisms and private environments, strengthens data privacy but also creates ethical and technical challenges. The use of anonymity technologies must be aligned with applicable legislation and responsible-use standards, avoiding loopholes for abuse or improper exposure.<\/p>\n\n\n\n<p>The processing, storage, and access of sensitive data in the Deep Web must comply with the <strong>LGPD<\/strong> in Brazil, the <strong>GDPR<\/strong> in the European Union, and the guidelines of the <strong>ANPD<\/strong> (Brazilian Data Protection Authority), ensuring digital governance aligned with international best practices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Compliance and Technical Standards in the Deep Web<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Structured Cabling:<\/strong> Physical infrastructure composed of pathways, spaces, dedicated entrances, and system separation follows technical standards to ensure isolation, integrity, and protection of non-indexed data flows.<\/li>\n\n\n\n<li><strong>Systems Security:<\/strong> Access-control systems, physical and logical integrity of components, fault protection, and violation detection are mandatory in critical environments.<\/li>\n\n\n\n<li><strong>Updates and Hardening:<\/strong> Adoption of continuous update policies, hardening of servers and critical segments, as well as updated antivirus and blocking of untrusted integrations.<\/li>\n<\/ul>\n\n\n\n<p>Compliance with these guidelines not only ensures regulatory conformity but also raises the level of resilience against sophisticated attack and compromise scenarios.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Access Control:<\/strong> Implementation of least privilege, logical segregation of environments, and constant auditing of permissions granted to users and third-party systems.<\/li>\n\n\n\n<li><strong>Monitoring and Backup:<\/strong> Automatic backup solutions and periodic data copying in high-security environments are mandatory for critical, high-availability operations.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Deep Web and Electronic Security: Integration and Best Practices<\/h2>\n\n\n\n<p>The interface between Deep Web environments and electronic security systems is unavoidable in <strong>advanced corporate and building infrastructures<\/strong>. Access-control integrations, video monitoring, and intrusion-detection systems, when connected through protected Deep Web segments, require reinforced physical and logical integrity controls.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Traffic Isolation:<\/strong> Ensuring that traffic between security devices and central systems flows through authenticated, encrypted, and monitored channels, mitigating risks of interception or manipulation.<\/li>\n\n\n\n<li><strong>Hardening Policy:<\/strong> Continuous hardening of all connected devices, with firmware and critical application updates, as well as the use of trusted integration with approved management software.<\/li>\n\n\n\n<li><strong>Monitoring and Resilience:<\/strong> Incident-detection and response systems integrated with Deep Web segments ensure rapid identification of threats and data recovery in the event of failure or hostile action.<\/li>\n<\/ul>\n\n\n\n<p>&#x1f4a1; <strong>Technical Tip:<\/strong><br>Implement multi-factor authentication policies and regularly monitor access logs to strengthen security in non-indexed environments.<\/p>\n\n\n\n<p>Alignment with international physical and logical security standards is fundamental to maintaining the integrity, confidentiality, and availability of interconnected systems within this ecosystem.<\/p>\n\n\n\n<p>The creation and maintenance of non-indexed corporate systems such as internal databases, intranets, and restricted platforms require adherence to infrastructure standards such as TIA\/EIA-568 and ABNT NBR 14565, which define standards for structured cabling, system separation, and physical network protection.<\/p>\n\n\n\n<details class=\"wp-block-details has-border-color is-layout-flow wp-container-core-details-is-layout-02234334 wp-block-details-is-layout-flow\" style=\"border-color:#075bf7;border-width:1px;margin-top:var(--wp--preset--spacing--50);padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--50)\"><summary>Frequently Asked Questions<\/summary>\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1752180459240\"><strong class=\"schema-faq-question\">Is the Deep Web illegal?<\/strong> <p class=\"schema-faq-answer\">No, but it depends on how it is used. Unauthorised access to private information is a crime.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1752180486826\"><strong class=\"schema-faq-question\">How can data be protected in the Deep Web?<\/strong> <p class=\"schema-faq-answer\">By using encryption, strong authentication, and continuous system updating.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1752180518852\"><strong class=\"schema-faq-question\">What are the main risks for companies?<\/strong> <p class=\"schema-faq-answer\">Data leakage, attacks on authenticated systems, and traffic interception.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1752180731330\"><strong class=\"schema-faq-question\">What does the Deep Web contain?<\/strong> <p class=\"schema-faq-answer\">The Deep Web gathers all internet content that is not indexed by traditional search engines, such as databases, internal company systems, academic portals, and restricted website areas that require authentication. It is not something &#8216;secret&#8217; by nature, but rather pages not openly accessible to the general public.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1752180762287\"><strong class=\"schema-faq-question\">Can the Deep Web be accessed from a mobile phone?<\/strong> <p class=\"schema-faq-answer\">Yes, it is possible to access Deep Web content from a mobile phone, especially banking applications, email, corporate platforms, and systems that require login. However, access to the Dark Web, which is a subset of the Deep Web, requires specific apps and configurations, such as browsers compatible with Tor.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1752180781702\"><strong class=\"schema-faq-question\">Where is the Dark Web located?<\/strong> <p class=\"schema-faq-answer\">The Dark Web is a subset of the Deep Web that is accessible only through specialised protocols and software such as the Tor browser. It is not located in any single physical place but distributed across servers around the world, outside the reach of conventional search engines.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1752180797531\"><strong class=\"schema-faq-question\">What is the Google of the Deep Web?<\/strong> <p class=\"schema-faq-answer\">There is no Google for the Deep Web because its content is not indexed by traditional search engines. However, there are specialised search tools for some restricted areas, such as academic databases or internal portals. In the Dark Web, the best-known search option is DuckDuckGo, accessible via Tor, though its indexing is limited.<\/p> <\/div> <\/div>\n<\/details>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"padding-top:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40)\">Conclusion<\/h2>\n\n\n\n<p>Understanding and properly managing the Deep Web requires deep technical knowledge of architecture, access protocols, network infrastructure, logical segregation, and physical and digital protection mechanisms. Non-indexed environments are essential for maintaining privacy, confidentiality, and control over strategic data, but they require rigorous information-security policies, regulatory alignment, and continuous hardening practices. The integration of critical systems with these environments demands standardised access controls, reinforced monitoring, and readiness for incident response, covering both cyber threats and operational risks.<\/p>\n\n\n\n<p>In engineering and security projects, adopting solid models for segmentation, authentication, and encryption is decisive for effective protection in Deep Web environments. Given the pace of technological change, continuous updating of methodologies and tools is recommended, as well as appreciation for interdisciplinarity between network engineering, IT, and cybersecurity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Considerations<\/h2>\n\n\n\n<p>Exploring the technical universe of the Deep Web reveals its strategic importance for private, corporate, and institutional environments, highlighting the need for advanced engineering and robust security practices. Continuous improvement of controls, aligned with recognised standards and frameworks, becomes a competitive differentiator for professionals and companies in the field.<\/p>\n\n\n\n<p>Thank you for reading this technical article. We invite everyone interested to follow A3A Engenharia de Sistemas on social media for more specialised content and authoritative updates on Systems Engineering, Networking, Security, and IT.<\/p>\n\n\n\n<details class=\"wp-block-details has-border-color is-layout-flow wp-container-core-details-is-layout-02234334 wp-block-details-is-layout-flow\" style=\"border-color:#075bf7;border-width:1px;margin-top:var(--wp--preset--spacing--50);padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--50)\"><summary>Normative References<\/summary>\n<p><strong>ISO\/IEC 27001<\/strong> &#8211; Information Security Management<\/p>\n\n\n\n<p><strong>ISO\/IEC 27002<\/strong> &#8211; Security Controls<\/p>\n\n\n\n<p><strong>ISO\/IEC 27005<\/strong> &#8211; Risk Management<\/p>\n\n\n\n<p><strong>TIA\/EIA-568<\/strong> &#8211; Structured Cabling<\/p>\n\n\n\n<p><strong>ABNT NBR 14565<\/strong> &#8211; Telecommunications Cabling Infrastructure<\/p>\n\n\n\n<p><strong>LGPD<\/strong> &#8211; Brazilian General Data Protection Law<\/p>\n\n\n\n<p><strong>GDPR<\/strong> &#8211; General Data Protection Regulation (EU)<\/p>\n\n\n\n<p><strong>ABNT NBR ISO\/IEC 27001<\/strong> &#8211; Information Security Management<\/p>\n\n\n\n<p><strong>ABNT NBR ISO\/IEC 27005<\/strong> &#8211; Risk Management<\/p>\n\n\n\n<p><strong>CERT.br<\/strong> &#8211; Brazilian Computer Security Incident Response Center<\/p>\n\n\n\n<p><strong>NIST Cybersecurity Framework<\/strong> &#8211; National Institute of Standards and Technology<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details has-border-color is-layout-flow wp-container-core-details-is-layout-02234334 wp-block-details-is-layout-flow\" style=\"border-color:#075bf7;border-width:1px;margin-top:var(--wp--preset--spacing--50);padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--50)\"><summary>Relevant Links (Complementary Technical Materials)<\/summary>\n<p><a href=\"https:\/\/a3aengenharia.com\/conteudo\/artigos-tecnicos\/nist-cybersecurity-framework\/\">What Is the NIST Cybersecurity Framework?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/a3aengenharia.com\/conteudo\/artigos-tecnicos\/dark-web-guia-completo\/\">Dark Web: Complete Guide<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.torproject.org\/\">Tor Project<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cert.br\/\">Cert.br<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/a3aengenharia.com\/conteudo\/artigos-tecnicos\/compliance-empresarial-definicao-beneficios-estrategias-implementacao\/\">Corporate Compliance: Technical Definition, Benefits, and Implementation Strategies<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/a3aengenharia.com\/ebooks\/por-que-contratar-um-projeto-de-cabeamento-estruturado\/\" target=\"_blank\" rel=\"noreferrer noopener\">eBook &#8211; Why Commission a Structured Cabling Project?<\/a><\/p>\n<\/details>\n\n","protected":false},"excerpt":{"rendered":"<p>Understand the Deep Web from a technical perspective: architecture, protocols, segmentation, risks, compliance, and best practices for secure corporate environments.<\/p>\n","protected":false},"author":0,"featured_media":19416,"parent":0,"template":"","meta":{"_a3a_post_lang":"en-us","_a3a_translation_group_id":"c95b44a0-742c-4a30-88a8-16dbff9d2cf4","_a3a_i18n_canonical_slug":"what-is-the-deep-web"},"categories":[307],"class_list":["post-71782","articles","type-articles","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/a3aengenharia.com\/en-us\/wp-json\/wp\/v2\/articles\/71782","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/a3aengenharia.com\/en-us\/wp-json\/wp\/v2\/articles"}],"about":[{"href":"https:\/\/a3aengenharia.com\/en-us\/wp-json\/wp\/v2\/types\/articles"}],"version-history":[{"count":1,"href":"https:\/\/a3aengenharia.com\/en-us\/wp-json\/wp\/v2\/articles\/71782\/revisions"}],"predecessor-version":[{"id":71783,"href":"https:\/\/a3aengenharia.com\/en-us\/wp-json\/wp\/v2\/articles\/71782\/revisions\/71783"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/a3aengenharia.com\/en-us\/wp-json\/wp\/v2\/media\/19416"}],"wp:attachment":[{"href":"https:\/\/a3aengenharia.com\/en-us\/wp-json\/wp\/v2\/media?parent=71782"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/a3aengenharia.com\/en-us\/wp-json\/wp\/v2\/categories?post=71782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}