The Dark web? I would like the emphasis be on the potential threats and a examination of whether an information security policy can effectively thwart potential attacks that originate from the dark web? Where would policy statements and planning documents fall short in this fight against the unknown?