Uploaded by Adam Elrashid

cyber safety

advertisement
Prepared by : Amar
Elrashid
Prepared for: Sr Suman
Class: 3A
What is Cyber Safety?
It is being safe and responsible when using
information and communication technology.
Some examples of being cyber safety are:
keeping personal information safe and secure
(e.g. name, address, school, credit card,
password.
Cyber activities
-
Multimedia
Google
Study
YouTube
Browsing the internet
Using Ipad
Using Smart phone
Games online
Emails
Cyber Risk using technologies
- Viruses
-Trojan horses
-Email scams
-Cyberbullying
-Identity theft
-bad material
- stealing other people works
Cyber bullying tactics are:
1 FLAMING: Online fights using electronic messages with angry and vulgar language.
2 HARASSMENT: Repeatedly sending nasty, mean, and insulting messages.
3 DENIGRATION: Sending or posting gossip or rumors about a person to damage his
or her reputation or friendships.
4 IMPERSONATION: Pretending to be someone else and sending or posting material
to get that account and sent a hurtful message
5 OUTING: Sharing someone's secrets or embarrassing information or images online.
6 TRICKERY: Talking someone into revealing secrets or embarrassing information,
then sharing it online.
7 EXCLUSION: Intentionally and cruelly excluding someone from an online group.
8 CYBERSTALKING: Repeated, intense harassment and denigration that includes
threats or creates significant fear.

Tell someone: Just let a trusted adult know what's going on. The worst
thing you can do is to keep it to yourself. Remember, it's not your
fault!

Don't instigate: If someone is sending you hurtful messages or posting
mean pictures, they're doing it to get an emotional response from you.
Don't give them one! Don't respond OR retaliate. This will only
encourage them to take it further.

Block them.: If it's on Facebook or another website that allows you to
block the person or leave the chat room, then do it!

Be aware: If you're a parent, encourage your kid(s) to talk about what
they're doing online and whom they're doing it with.

Block them agian: The majority of cyber bullying occurs by someone
you already know. These are also the people that are closest to you
and your passwords, so keep them safe.

Always log out: Especially on public computers.

Don't be a cyber bully yourself: It's easy to be hurtful, so remember
what it's like for the person on the other side

"Identity theft is a form of stealing someone's identity in which someone
pretends to be someone else by assuming that person's identity" - Wikipedia

PROTECT YOURSELF

The best way to make sure that your identity never gets stolen is to act
right now and follow these steps to protect yourself before an identity
theft attacks.

PASSWORDS, Following these steps will help you easily create a strong
password:

·
Use more than one password.

·
Use (not-so) random characters

·
For example: MNIAILS21 ( my name is Amar I love Soccer 21 )

·
Unique- Is the password unrelated to your other passwords?

·
Practical- Can you remember it without having to write it down?

·
Recent- Have you changed it recently?

Phisher emails will typically ask for information such as usernames,
passwords, credit card numbers, date of birth, etc.

Click here to verify and update your information!!YOU'VE BEEN
SCAMMED!!!* FAKE EMAILS!! YOU'VE WON!!! Redeem your prize before
it's too late!! SCAMMED AGAIN!!!

Phishers try to get people to react immediately, so lure emails
generally have upsetting or exciting, but false, statements
AVOID A PHISHING ATTACK
Some easy ways to make sure you are never a victim to phishing are:

Avoid filling out the information that the email asks you to give.

Only give personal information through a secure website or over the phone.

Never use the links in the email, instant message, or wherever you suspect
someone might be trying to steal your information.

Beware of false websites. Phishers are able to "spoof," or forge, a site into
looking like a legitimate address.

Check to make sure you're on the right website. Just because the page
looks familiar doesn't mean it's real.
"A computer virus is a computer program that can replicate itself and spread from one computer to
another” - Wikipedia
TROJAN HORSES
A Trojan horse is a file that is often confused to be a computer virus. While it is still harmful, it is not
considered a virus because it does not spread from computer to computer.
EMAIL VIRUSES
Emails can contain harmful files, including both computer viruses and Trojan horses. Viruses found in
emails can't harm your computer unless they are executed, or opened
KEEPING YOUR COMPUTER SAFE
ANTI-VIRUS SOFTWARE
The first and best step you can take to
protecting your computer from viruses is
to install an anti-virus program.
• The internet is a fun place to be, but it can also be
dangerous. Follow these steps to safely have fun on the
web!
• Always ask for your parents' permission before going online.
• Never talk to anyone online that you don't know.
• Tell your parents if anyone ever asks to meet you
somewhere.
• Don't let anyone know your name, phone number, address,
or any other personal information.
• If you find yourself on a website that you don't think you
should be on, you should exit the page.
• Keep pictures of yourself off the internet unless it's ok with
your parents.
• Be respectful of other people on the internet and never say
anything mean.
• Reinforce regularly with your kids the following online
safety rules
•
•
•
•
•
•
•
•
•
•
•
NEVER tell anyone your full name, address, phone number or school
send a photo of yourself to anyone that you don’t know
tell anyone your credit card or bank details
make plans to meet anyone you find online – people you meet online aren’t
always who they claim they are
talk to anyone who is nasty or makes you feel uncomfortable
You should ALWAYS:
be careful who you talk to online
ask permission to use online games with chat features
tell your parents or carer if someone says something to you online that makes
you feel uncomfortable or unsafe
stay away from websites that are not meant for children
remember that people are not always who they say they are online
1.Content Risks: Children may accidentally come across
content that makes them uncomfortable during internet
surfing, such as, pornography, violence, and so on.
2.Contact Risks: Kids may come in contact with strangers,
dangerous people posing as kids, or people fishing for
their personal information to name a few.
3.Conduct Risks: Inadvertently, children may act in an
unacceptable way. For example, they may perform any inapp purchases without consulting the parents.
Thank you for reading
Amar Elashid
Download