Prepared by : Amar Elrashid Prepared for: Sr Suman Class: 3A What is Cyber Safety? It is being safe and responsible when using information and communication technology. Some examples of being cyber safety are: keeping personal information safe and secure (e.g. name, address, school, credit card, password. Cyber activities - Multimedia Google Study YouTube Browsing the internet Using Ipad Using Smart phone Games online Emails Cyber Risk using technologies - Viruses -Trojan horses -Email scams -Cyberbullying -Identity theft -bad material - stealing other people works Cyber bullying tactics are: 1 FLAMING: Online fights using electronic messages with angry and vulgar language. 2 HARASSMENT: Repeatedly sending nasty, mean, and insulting messages. 3 DENIGRATION: Sending or posting gossip or rumors about a person to damage his or her reputation or friendships. 4 IMPERSONATION: Pretending to be someone else and sending or posting material to get that account and sent a hurtful message 5 OUTING: Sharing someone's secrets or embarrassing information or images online. 6 TRICKERY: Talking someone into revealing secrets or embarrassing information, then sharing it online. 7 EXCLUSION: Intentionally and cruelly excluding someone from an online group. 8 CYBERSTALKING: Repeated, intense harassment and denigration that includes threats or creates significant fear. Tell someone: Just let a trusted adult know what's going on. The worst thing you can do is to keep it to yourself. Remember, it's not your fault! Don't instigate: If someone is sending you hurtful messages or posting mean pictures, they're doing it to get an emotional response from you. Don't give them one! Don't respond OR retaliate. This will only encourage them to take it further. Block them.: If it's on Facebook or another website that allows you to block the person or leave the chat room, then do it! Be aware: If you're a parent, encourage your kid(s) to talk about what they're doing online and whom they're doing it with. Block them agian: The majority of cyber bullying occurs by someone you already know. These are also the people that are closest to you and your passwords, so keep them safe. Always log out: Especially on public computers. Don't be a cyber bully yourself: It's easy to be hurtful, so remember what it's like for the person on the other side "Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity" - Wikipedia PROTECT YOURSELF The best way to make sure that your identity never gets stolen is to act right now and follow these steps to protect yourself before an identity theft attacks. PASSWORDS, Following these steps will help you easily create a strong password: · Use more than one password. · Use (not-so) random characters · For example: MNIAILS21 ( my name is Amar I love Soccer 21 ) · Unique- Is the password unrelated to your other passwords? · Practical- Can you remember it without having to write it down? · Recent- Have you changed it recently? Phisher emails will typically ask for information such as usernames, passwords, credit card numbers, date of birth, etc. Click here to verify and update your information!!YOU'VE BEEN SCAMMED!!!* FAKE EMAILS!! YOU'VE WON!!! Redeem your prize before it's too late!! SCAMMED AGAIN!!! Phishers try to get people to react immediately, so lure emails generally have upsetting or exciting, but false, statements AVOID A PHISHING ATTACK Some easy ways to make sure you are never a victim to phishing are: Avoid filling out the information that the email asks you to give. Only give personal information through a secure website or over the phone. Never use the links in the email, instant message, or wherever you suspect someone might be trying to steal your information. Beware of false websites. Phishers are able to "spoof," or forge, a site into looking like a legitimate address. Check to make sure you're on the right website. Just because the page looks familiar doesn't mean it's real. "A computer virus is a computer program that can replicate itself and spread from one computer to another” - Wikipedia TROJAN HORSES A Trojan horse is a file that is often confused to be a computer virus. While it is still harmful, it is not considered a virus because it does not spread from computer to computer. EMAIL VIRUSES Emails can contain harmful files, including both computer viruses and Trojan horses. Viruses found in emails can't harm your computer unless they are executed, or opened KEEPING YOUR COMPUTER SAFE ANTI-VIRUS SOFTWARE The first and best step you can take to protecting your computer from viruses is to install an anti-virus program. • The internet is a fun place to be, but it can also be dangerous. Follow these steps to safely have fun on the web! • Always ask for your parents' permission before going online. • Never talk to anyone online that you don't know. • Tell your parents if anyone ever asks to meet you somewhere. • Don't let anyone know your name, phone number, address, or any other personal information. • If you find yourself on a website that you don't think you should be on, you should exit the page. • Keep pictures of yourself off the internet unless it's ok with your parents. • Be respectful of other people on the internet and never say anything mean. • Reinforce regularly with your kids the following online safety rules • • • • • • • • • • • NEVER tell anyone your full name, address, phone number or school send a photo of yourself to anyone that you don’t know tell anyone your credit card or bank details make plans to meet anyone you find online – people you meet online aren’t always who they claim they are talk to anyone who is nasty or makes you feel uncomfortable You should ALWAYS: be careful who you talk to online ask permission to use online games with chat features tell your parents or carer if someone says something to you online that makes you feel uncomfortable or unsafe stay away from websites that are not meant for children remember that people are not always who they say they are online 1.Content Risks: Children may accidentally come across content that makes them uncomfortable during internet surfing, such as, pornography, violence, and so on. 2.Contact Risks: Kids may come in contact with strangers, dangerous people posing as kids, or people fishing for their personal information to name a few. 3.Conduct Risks: Inadvertently, children may act in an unacceptable way. For example, they may perform any inapp purchases without consulting the parents. Thank you for reading Amar Elashid