SlideShare uma empresa Scribd logo
1 de 29
Baixar para ler offline
Students, the
Internet &
COVID-19
PRESENTED BY AYUSH CHOPRA
With school closures and social distancing
measures to curb the spread of COVID-19, children
are spending more time than ever online.
As a result, students are getting more screen-time
than usual.
LET'S FACE IT
We must know...
Everything increased in today's scenarios
THEY CAN SCROLL BEFORE
THEY CAN CRAWL
UNDERSTANDING THE
CYBER WORLD
Cyber crimes can be defined as: "Offences that are committed against
individuals or groups of individuals with a criminal motive to intentionally
harm the reputation of the victim or cause physical or mental harm, or
loss, to the victim directly or indirectly, using modern telecommunication
networks such as Internet (networks including chat rooms, emails, notice
boards and groups) and mobile phones (Bluetooth/SMS/MMS)".
DEFINING CYBER CRIME
TYPES OF CYBER CRIMES 
HACKING
The gaining of unauthorized access to data in a system or computer.
PHISHING
The fraudulent practice of sending emails purporting to be from reputable companies in order to
induce individuals to reveal personal information, such as passwords and credit card numbers.
IN-HOUSE MAINTENANCE
Presentations are communication tools.
PIRACY
The unauthorized use or reproduction of another's work.
VIRUSES
A piece of code which is capable of copying itself and typically has a detrimental effect,
such as corrupting the system or destroying data.
ONLINE FINANCIAL
TRANSACTIONS IN-HOUSE MAINTENANCE
Presentations are communication tools.
PHARMING
the fraudulent practice of directing Internet users to a bogus website that mimics the
appearance of a legitimate one, in order to obtain personal information such as
passwords, account numbers, etc.
IDENTITY THEFTS
The fraudulent acquisition and use of a person's private identifying information, usually
for financial gain.
COMPUTER ETHICS
Ethics means “What is wrong and What is
Right”. It is a set of moral principles that rule the
behaviour of individuals who use computers.
Computer ethics are a set of moral standards
that govern the use of computers, both
hardware and software.
ETHICS
COMPUTER ETHICS
ONE SHOULD NOT ...
Use a computer to harm other people.
Interfere with other people's computer work or files.
Use a computer to steal or bear false information.
Copy or use proprietary software for which you have
not paid for.
Use other people's computer resources without
authorisation or proper compensation.
Computer security, cybersecurity is the protection of computer
systems and networks from the theft of or damage to their hardware,
software or electronic data, as well as from the disruption or
misdirection of the services they provide.
To safeguard
cybersecurity
YOU SHOULD...
Install a good antivirus.
Update antivirus regularly.
Always scan external drives before using.
Should use recommended secured sites with lock
sign.
Hypertext Transfer Protocol Secure (HTTPS) is an
extension of the Hyper Text Transfer Protocol(HTTP). It
is used for secure communication over a computer
  network, and is widely used on the Internet.
SAFE EMAIL
PRACTICES
LIMIT PUBLIC INFORMATION
Attackers cannot target you if they don’t know your email
addresses. Don’t publish non-essential contact details on
your website or on any public directories, including phone
numbers or physical addresses.
CAREFULLY CHECK EMAILS
Phishing attacks are seldom perfectly executed. A bizarre
From address (e.g. service145@mail.145.com), unusual links
(e.g. amazon.net.ru), or a high number of typos or
formatting mistakes in the text. If it looks suspicious,
students should report it.
BEWARE OF LINKS & ATTACHMENTS
You should be sceptical anytime you receive an email from
an unknown sender. Do not click on links or download
attachments without verifying the source and establishing
the legitimacy of the link or attachment.
SAFE EMAIL PRACTICES
HOVER OVER HYPERLINKS
Never click on hyperlinked text without hovering your cursor
over the link first to check the destination URL, which should
appear in the lower corner of your window. Sometimes the
hacker might disguise a malicious link as a short URL.
NEVER ENTER YOUR PASSWORD
Unless you’re 100% certain the website is legitimate, you
should never enter your password anywhere. If you aren’t
logging into your account and you haven’t requested to
reset your password, then password reset links are likely
part of a phishing attack.
ONLINE PREDATORS 
As per Indian Information Technology Act, 2000, the
significant aspect of Section 67B seeks to protect
children. This law penalizes any and every person who
facilitates the abuse of children online.
Online Predators are individuals who commit child
sexual abuse that begins or takes place on the internet.
Chat rooms, instant messaging, Internet forums, social
networking sites, cell phones have issues with online
predations.
While practicing Social Distancing, Social networking sites like Facebook,
Instagram, Twitter, Whatsapp etc can be a great way to connect with friends.
But there are some social networking safety tips you should always keep in
mind.
SAFE SOCIAL
NETWORKING
BEST PRACTICES
REMEMBER ONCE POSTED, ALWAYS
POSTED .. MAINTAIN GOOD DIGITAL
FOOTPRINTS
Protect your reputation on social networks. What you post
online stays online. Think twice before posting pictures
you wouldn't want your parents or future employers to
see. Recent research found that 70% of job recruiters
rejected candidates based on information they found
online.
MANAGE YOUR PRIVACY SETTINGS
Learn about and use the privacy and security settings on your
social networking sites. They help you control who sees what you
post and manage your online experience in a positive way.
KEEP PERSONAL INFO PERSONAL
Be careful how much personal info you provide on social networking sites. The more information
you post, the easier it may be for someone to use that information to steal your identity, access
your data, or commit other crimes such as stalking.
USE STRONG PASSWORDS
Make sure that your password is at least eight characters long and consists of some
combination of letters, numbers, and special characters (for example, +, @, #, or $).
SAFE SOCIAL NETWORKING
BEST PRACTICES
KNOW WHAT ACTION TO TAKE
If someone is harassing or threatening you, remove them from your friends list, block them,
and report them to the site administrator.
SELECT BLOCKING
Block specific users or application invitations
SAFE SOCIAL NETWORKING
DOCUMENTED PROOF
Remember whatever you write on social site is a
Documented proof of what you have expressed
and will remain there for ever and may be used
as an evidence against you in future.
ACCEPTED THE TERMS
Remember that legally you have accepted the
terms while signing up the social networking site. So
abide by the discipline.
Cyber Bullying
Cyber Bullying
REACH MEFACEBOOK
https://www.facebook.com/wizardayush
https://www.facebook.com/SDGsForChildren
TWITTER
https://twitter.com/ayushchopra24
https://twitter.com/SDGsForChildren
INSTAGRAM
https://www.instagram.com/wizardayush
https://www.instagram.com/sdgsforchildren
http://www.SDGsForChildren.org
Thank you!
WHAT GOES ON INTERNET, STAYS ON INERNET!

Mais conteúdo relacionado

Mais procurados

Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
aisha747
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
rayarren06
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 

Mais procurados (19)

Phishing
PhishingPhishing
Phishing
 
Facebook
FacebookFacebook
Facebook
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 

Semelhante a Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HemantSharma134028
 
Online-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdfOnline-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdf
marissaramos007
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 

Semelhante a Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1 (20)

Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Online-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdfOnline-safety-security-ethics-and-etiquette.pdf
Online-safety-security-ethics-and-etiquette.pdf
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 

Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1

  • 2. With school closures and social distancing measures to curb the spread of COVID-19, children are spending more time than ever online. As a result, students are getting more screen-time than usual. LET'S FACE IT
  • 3. We must know... Everything increased in today's scenarios
  • 4. THEY CAN SCROLL BEFORE THEY CAN CRAWL
  • 6. Cyber crimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)". DEFINING CYBER CRIME
  • 7. TYPES OF CYBER CRIMES 
  • 8. HACKING The gaining of unauthorized access to data in a system or computer. PHISHING The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. IN-HOUSE MAINTENANCE Presentations are communication tools. PIRACY The unauthorized use or reproduction of another's work. VIRUSES A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  • 9.
  • 10.
  • 11. ONLINE FINANCIAL TRANSACTIONS IN-HOUSE MAINTENANCE Presentations are communication tools. PHARMING the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc. IDENTITY THEFTS The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  • 12. COMPUTER ETHICS Ethics means “What is wrong and What is Right”. It is a set of moral principles that rule the behaviour of individuals who use computers. Computer ethics are a set of moral standards that govern the use of computers, both hardware and software. ETHICS
  • 13. COMPUTER ETHICS ONE SHOULD NOT ... Use a computer to harm other people. Interfere with other people's computer work or files. Use a computer to steal or bear false information. Copy or use proprietary software for which you have not paid for. Use other people's computer resources without authorisation or proper compensation.
  • 14. Computer security, cybersecurity is the protection of computer systems and networks from the theft of or damage to their hardware, software or electronic data, as well as from the disruption or misdirection of the services they provide.
  • 15. To safeguard cybersecurity YOU SHOULD... Install a good antivirus. Update antivirus regularly. Always scan external drives before using. Should use recommended secured sites with lock sign. Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hyper Text Transfer Protocol(HTTP). It is used for secure communication over a computer   network, and is widely used on the Internet.
  • 16. SAFE EMAIL PRACTICES LIMIT PUBLIC INFORMATION Attackers cannot target you if they don’t know your email addresses. Don’t publish non-essential contact details on your website or on any public directories, including phone numbers or physical addresses. CAREFULLY CHECK EMAILS Phishing attacks are seldom perfectly executed. A bizarre From address (e.g. service145@mail.145.com), unusual links (e.g. amazon.net.ru), or a high number of typos or formatting mistakes in the text. If it looks suspicious, students should report it. BEWARE OF LINKS & ATTACHMENTS You should be sceptical anytime you receive an email from an unknown sender. Do not click on links or download attachments without verifying the source and establishing the legitimacy of the link or attachment.
  • 17. SAFE EMAIL PRACTICES HOVER OVER HYPERLINKS Never click on hyperlinked text without hovering your cursor over the link first to check the destination URL, which should appear in the lower corner of your window. Sometimes the hacker might disguise a malicious link as a short URL. NEVER ENTER YOUR PASSWORD Unless you’re 100% certain the website is legitimate, you should never enter your password anywhere. If you aren’t logging into your account and you haven’t requested to reset your password, then password reset links are likely part of a phishing attack.
  • 18. ONLINE PREDATORS  As per Indian Information Technology Act, 2000, the significant aspect of Section 67B seeks to protect children. This law penalizes any and every person who facilitates the abuse of children online. Online Predators are individuals who commit child sexual abuse that begins or takes place on the internet. Chat rooms, instant messaging, Internet forums, social networking sites, cell phones have issues with online predations.
  • 19. While practicing Social Distancing, Social networking sites like Facebook, Instagram, Twitter, Whatsapp etc can be a great way to connect with friends. But there are some social networking safety tips you should always keep in mind.
  • 20. SAFE SOCIAL NETWORKING BEST PRACTICES REMEMBER ONCE POSTED, ALWAYS POSTED .. MAINTAIN GOOD DIGITAL FOOTPRINTS Protect your reputation on social networks. What you post online stays online. Think twice before posting pictures you wouldn't want your parents or future employers to see. Recent research found that 70% of job recruiters rejected candidates based on information they found online. MANAGE YOUR PRIVACY SETTINGS Learn about and use the privacy and security settings on your social networking sites. They help you control who sees what you post and manage your online experience in a positive way. KEEP PERSONAL INFO PERSONAL Be careful how much personal info you provide on social networking sites. The more information you post, the easier it may be for someone to use that information to steal your identity, access your data, or commit other crimes such as stalking.
  • 21. USE STRONG PASSWORDS Make sure that your password is at least eight characters long and consists of some combination of letters, numbers, and special characters (for example, +, @, #, or $). SAFE SOCIAL NETWORKING BEST PRACTICES KNOW WHAT ACTION TO TAKE If someone is harassing or threatening you, remove them from your friends list, block them, and report them to the site administrator. SELECT BLOCKING Block specific users or application invitations
  • 22. SAFE SOCIAL NETWORKING DOCUMENTED PROOF Remember whatever you write on social site is a Documented proof of what you have expressed and will remain there for ever and may be used as an evidence against you in future. ACCEPTED THE TERMS Remember that legally you have accepted the terms while signing up the social networking site. So abide by the discipline.
  • 24.
  • 25.
  • 27.
  • 29. Thank you! WHAT GOES ON INTERNET, STAYS ON INERNET!