2. We all have been acquainted with one of the
greatest inventions of mankind, the Internet.
The Internet is an astounding place.
It contains information about every topic the human brain can
fathom.
The amount of data it holds is leagues beyond the imagination of the
mind.
5. INTRODUCTION
These basics provides some basic information and practical suggestions
for protecting your personal information and computer from cyber-
attacks.
Cyber-safety topics covered include:
6. • 20% of kids cyberbullied think
about suicide, and 1 in 10 attempt
it.
• 42% of teenagers with tech access
report being cyberbullied over the
past year
• Over 25 percent of adolescents
and teens have been bullied
repeatedly through their cell
phones or the Internet.
7. What is cyber bullying?
• Sending mean messages or threats to a person's
email account or cell phone.
• Spreading rumours online or through texts.
• Posting hurtful or threatening messages on
social networking sites or web pages.
• Stealing a person's account information to
break into their account and send damaging
messages.
• Pretending to be someone else online to hurt
another person.
8. As the quote goes, “Prevention is better
than cure” so we will as well make an
attempt to go cybersafe so that we don’t
end up opening the ‘Pandora’s Box of the
digital world’.
11. WHAT IS CYBER-SAFETY?
▪ Cyber-safety is a common term used to describe
a set of practices, measures and/or actions you
can take to protect personal information and
your computer from attacks.
• Further, there are services in place to help all
students, faculty and staff meet the cyber-safety
standards. Specific information about these
services is provided here.
12. • Don’t share your passwords with
anyone
• Make them secure:
• Should have at least 8 characters
• Should include capital and lower
case letters
• Should include at least one
number and one special character
• DON’T use the same password for
everything
• Change your passwords from time
to time
Passwords
17. CONSEQUENCES OF INACTION
In addition to the risks identified on the previous slide, as part of the community
you may face a number of other consequences if you fail to take actions to protect
personal information and your computer. Consequences include:
18. • Don’t always trust your newfound online friends.
Remember, the predator waits patiently.
• Make passwords long and strong. Use a combination
of lower and uppercase letters along with symbols.
• Links in email, tweets, posts, and online advertising
are often the way cybercriminals compromise your
computer. If it looks suspicious, even if you know the
source, it’s best to delete or if appropriate, mark as
junk email.
19. TOP SEVEN CYBER-SAFETY ACTIONS
1. Install OS/Software Updates
2. Run Anti-virus Software
3. Prevent Identity Theft
4. Turn on Personal Firewalls
5. Avoid Spyware/Adware
7. Back up Important Files
6. Protect Passwords
20.
21. CYBER-SAFETY SERVICES
Some services and software to protect the campus network
against cyber-safety attacks.
These include:
Services Software
▪Email virus filtering
▪Firewall services
▪Email attachment filtering
▪Vulnerability scanning
▪Intrusion prevention system
▪ Free anti-virus software:
Kaspersky, Avast, AVG
▪ Free encryption software:
Bitlocker PC