SlideShare uma empresa Scribd logo
1 de 23
Cyber Safety
We all have been acquainted with one of the
greatest inventions of mankind, the Internet.
The Internet is an astounding place.
It contains information about every topic the human brain can
fathom.
The amount of data it holds is leagues beyond the imagination of the
mind.
BUT
INTRODUCTION
These basics provides some basic information and practical suggestions
for protecting your personal information and computer from cyber-
attacks.
Cyber-safety topics covered include:
• 20% of kids cyberbullied think
about suicide, and 1 in 10 attempt
it.
• 42% of teenagers with tech access
report being cyberbullied over the
past year
• Over 25 percent of adolescents
and teens have been bullied
repeatedly through their cell
phones or the Internet.
What is cyber bullying?
• Sending mean messages or threats to a person's
email account or cell phone.
• Spreading rumours online or through texts.
• Posting hurtful or threatening messages on
social networking sites or web pages.
• Stealing a person's account information to
break into their account and send damaging
messages.
• Pretending to be someone else online to hurt
another person.
As the quote goes, “Prevention is better
than cure” so we will as well make an
attempt to go cybersafe so that we don’t
end up opening the ‘Pandora’s Box of the
digital world’.
It’s time we
bridge the
digital divide.
WHAT IS CYBER-SAFETY?
▪ Cyber-safety is a common term used to describe
a set of practices, measures and/or actions you
can take to protect personal information and
your computer from attacks.
• Further, there are services in place to help all
students, faculty and staff meet the cyber-safety
standards. Specific information about these
services is provided here.
• Don’t share your passwords with
anyone
• Make them secure:
• Should have at least 8 characters
• Should include capital and lower
case letters
• Should include at least one
number and one special character
• DON’T use the same password for
everything
• Change your passwords from time
to time
Passwords
CYBER-SAFETY THREATS
First, let’s talk about some common cyber-safety threats and the
problems they can cause . . .
CONSEQUENCES OF INACTION
In addition to the risks identified on the previous slide, as part of the community
you may face a number of other consequences if you fail to take actions to protect
personal information and your computer. Consequences include:
• Don’t always trust your newfound online friends.
Remember, the predator waits patiently.
• Make passwords long and strong. Use a combination
of lower and uppercase letters along with symbols.
• Links in email, tweets, posts, and online advertising
are often the way cybercriminals compromise your
computer. If it looks suspicious, even if you know the
source, it’s best to delete or if appropriate, mark as
junk email.
TOP SEVEN CYBER-SAFETY ACTIONS
1. Install OS/Software Updates
2. Run Anti-virus Software
3. Prevent Identity Theft
4. Turn on Personal Firewalls
5. Avoid Spyware/Adware
7. Back up Important Files
6. Protect Passwords
CYBER-SAFETY SERVICES
Some services and software to protect the campus network
against cyber-safety attacks.
These include:
Services Software
▪Email virus filtering
▪Firewall services
▪Email attachment filtering
▪Vulnerability scanning
▪Intrusion prevention system
▪ Free anti-virus software:
Kaspersky, Avast, AVG
▪ Free encryption software:
Bitlocker PC
cybersecurity and Bullying
cybersecurity and Bullying

Mais conteúdo relacionado

Mais procurados

Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
Aimee Shuck
 

Mais procurados (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Krishna cyber safety
Krishna cyber safetyKrishna cyber safety
Krishna cyber safety
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
IT Security
IT SecurityIT Security
IT Security
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 

Semelhante a cybersecurity and Bullying

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
MdRuga
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
ExtremelyDarkness2
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
BHUt6
 

Semelhante a cybersecurity and Bullying (20)

Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Staying safe-on-internet
Staying safe-on-internetStaying safe-on-internet
Staying safe-on-internet
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

cybersecurity and Bullying

  • 2. We all have been acquainted with one of the greatest inventions of mankind, the Internet. The Internet is an astounding place. It contains information about every topic the human brain can fathom. The amount of data it holds is leagues beyond the imagination of the mind.
  • 3. BUT
  • 4.
  • 5. INTRODUCTION These basics provides some basic information and practical suggestions for protecting your personal information and computer from cyber- attacks. Cyber-safety topics covered include:
  • 6. • 20% of kids cyberbullied think about suicide, and 1 in 10 attempt it. • 42% of teenagers with tech access report being cyberbullied over the past year • Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet.
  • 7. What is cyber bullying? • Sending mean messages or threats to a person's email account or cell phone. • Spreading rumours online or through texts. • Posting hurtful or threatening messages on social networking sites or web pages. • Stealing a person's account information to break into their account and send damaging messages. • Pretending to be someone else online to hurt another person.
  • 8. As the quote goes, “Prevention is better than cure” so we will as well make an attempt to go cybersafe so that we don’t end up opening the ‘Pandora’s Box of the digital world’.
  • 9. It’s time we bridge the digital divide.
  • 10.
  • 11. WHAT IS CYBER-SAFETY? ▪ Cyber-safety is a common term used to describe a set of practices, measures and/or actions you can take to protect personal information and your computer from attacks. • Further, there are services in place to help all students, faculty and staff meet the cyber-safety standards. Specific information about these services is provided here.
  • 12. • Don’t share your passwords with anyone • Make them secure: • Should have at least 8 characters • Should include capital and lower case letters • Should include at least one number and one special character • DON’T use the same password for everything • Change your passwords from time to time Passwords
  • 13.
  • 14.
  • 15.
  • 16. CYBER-SAFETY THREATS First, let’s talk about some common cyber-safety threats and the problems they can cause . . .
  • 17. CONSEQUENCES OF INACTION In addition to the risks identified on the previous slide, as part of the community you may face a number of other consequences if you fail to take actions to protect personal information and your computer. Consequences include:
  • 18. • Don’t always trust your newfound online friends. Remember, the predator waits patiently. • Make passwords long and strong. Use a combination of lower and uppercase letters along with symbols. • Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.
  • 19. TOP SEVEN CYBER-SAFETY ACTIONS 1. Install OS/Software Updates 2. Run Anti-virus Software 3. Prevent Identity Theft 4. Turn on Personal Firewalls 5. Avoid Spyware/Adware 7. Back up Important Files 6. Protect Passwords
  • 20.
  • 21. CYBER-SAFETY SERVICES Some services and software to protect the campus network against cyber-safety attacks. These include: Services Software ▪Email virus filtering ▪Firewall services ▪Email attachment filtering ▪Vulnerability scanning ▪Intrusion prevention system ▪ Free anti-virus software: Kaspersky, Avast, AVG ▪ Free encryption software: Bitlocker PC