SlideShare ist ein Scribd-Unternehmen logo
1 von 15
INTERNET
SAFETY
TOOLS OF INTERNET
World Wide Web (WWW): This is the part of the internet
that most people are most familiar with. It's the system of
interconnected documents and other resources that can be
accessed via a web browser.
Domain: A domain is the part of a web address that identifies
a particular website. For example, in the web address
"www.example.com", "example.com" is the domain
• IP address: An IP address is a numerical label Router: A
router is a device that connects computer networks together
and allows data to be transmitted between them. It routes
data packets between devices on a network.each device
connected to a computer network that uses the Internet
Protocol for communication. An IP address serves two main
functions: it identifies the host or device, and it provides the
location of the host in the network.
• Server: A server is a computer that provides services to other
computers or devices. For example, a web server is a
computer that stores and serves web pages to users.
• Router: A router is a device that connects computer
networks together and allows data to be transmitted
between them. It routes data packets between devices on a
network.
• Use strong and unique passwords: Use a combination
of letters, numbers, and special characters in your
passwords and make sure to use different passwords
for different accounts.
• Enable two-factor authentication: This adds an extra
layer of security to your accounts by requiring you to
enter a code sent to your phone or email in addition to
your password.
• Be Careful Who You Meet Online-People you meet
online are not always who they claim to be. Indeed,
they may not even be real. As InfoWorld reports, fake
social media profiles are a popular way for hackers to
cozy up to unwary Web users and pick their cyber
• Keep Personal Information Professional and Limited-
Potential employers or customers don't need to know your
personal relationship status or your home address. They do
need to know about your expertise and professional
background, and how to get in touch with you. You wouldn't
hand purely personal information out to strangers
individually—don't hand it out to millions of people online.
• . Keep Your Privacy Settings On-Marketers love to know all
about you, and so do hackers. Both can learn a lot from your
browsing and social media usage. But you can take charge of
your information. As noted by Lifehacker, both web browsers
and mobile operating systems have settings available to
protect your privacy online. Major websites like Facebook
also have privacy-enhancing settings available.
• Be cautious of phishing attacks: Be wary of emails or website
that ask for personal information or login credentials. If you're
unsure about the legitimacy of an email or website, do some
research or contact the company directly.
• Install anti-virus software: This can help protect your
computer from malware and viruses that can steal your
personal information or damage your system.
• Be mindful of what you share online: Think twice before
posting personal information or photos online, and be
cautious about accepting friend requests from strangers
• Make Sure Your Internet Connection is Secure.- Use a
Secure VPN Connectionimprove your Internet browsing
safety, use secure VPN connection (virtual private network ).
VPN enables you to have a secure connection between your
device and an Internet server that no one can monitor or
access the data that you’re exchanging.
• Make Online Purchases From Secure Sites-Any time you
make a purchase online, you need to provide credit card or
bank account information—just what cybercriminals are
most eager to get their hands on. Only supply this
information to sites that provide secure, encrypted
connections.
TYPES OF INTERNET ISSUES
•Malware-
• Malware is one of the types of attacks that need maximum defense by a
Cyber Safety system. Typically, malware enters your system/ network
and denies access to the critical components of the network. There are
various types of it such as-
• Viruses-A virus usually comes as an attachment in an email that holds a
virus payload, or the part of the malware that performs the malicious
action. Once the victim opens the file, the device is infected.
• Spyware-Spyware is a program installed on your computer, usually
without your explicit knowledge, that captures and transmits personal
information or Internet browsing habits and details to its user.
•PHISING-
• Phising attacks are the practice of sending fraudulent
communications that appear to come from a reputable
source. It is usually done through email. The goal is to steal
sensitive data like credit card and login information, or to
install malware on the victim’s machine. Phishing is a
common type of cyber attack that everyone should learn
about in order to protect themselves.Phishing starts with a
fraudulent email or other communication that is designed
to lure a victim. The message is made to look as though it
comes from a trusted sender. If it fools the victim, he or she
is coaxed into providing confidential information, often on a
scam website.
CYBER SECURITY
A cyber security threat refers to any possible malicious attack
that seeks to unlawfully access data, disrupt digital operations
or damage information. Cyber threats can originate from
various actors, including corporate spies, hacktivists, terrorist
groups, hostile nation-states, criminal organizations, lone
hackers and disgruntled employees.
CYBER BULLYING
Cyberbullying is the act of using the internet to harm someone. There are
various forms of cyberbullying.
Flaming – This type of cyberbullying involves online fights with angry and vulgar
messages.
Harassment – Online harassment can take the form of insulting, mean, and
derogatory messages online.
Denigration – Denigration is when someone posts rumors or gossip about
someone online, with the purpose of damaging their reputation.
Impersonation – Impersonation means pretending to be someone else to get
them in trouble.
Outing – Outing is when someone shares somebody else’s secrets, images or
information online.
Trickery – When people trick someone into revealing things and then post them
online, it’s called Trickery.
Exclusion – Exclusion is when an individual or a group of people intentionally
keeps someone out of an online group.
Cyberstalking – Cyberstalking is usually done to create fear in an individual using
repeated harassment and denigration.
CYBER BULLYING PREVENTION TIPS FOR
STUDENTS
• TALK ABOUT IT.- If you’re the target of cyberbullying.
Whether it’s your parents, a teacher, or another trusted
adult, or even your best friend, never keep to yourself the
fact that you’re being bullied.
• IGNORE THEM- If there is an isolated incident where you
are being bullied, don’t respond to the instigator. Those
who cyberbully but who do not get a response from their
target may just move on.
• NEVER RETALIATE- Be the bigger person and never retaliate
against someone who is mean to you. Retaliation only
further perpetuates the cycle of violence, and does nothing
to solve the problem.
• SAVE THE EVIDENCE-. Record all instances of cyberbullying.
Print out social media posts and emails, save texts, and
capture screen shots when cyberbullying occurs. You can
even make screen recordings of Snapchat, Facebook, or
Instagram Stories.
• REPORT IT TO THE CONTENT PROVIDER.- If don’t know
who is cyberbullying you, contact the provider of the site or
platform where the cyberbullying is occurring and make a
report.
SAFE DIGITAL BANKING
INTERNET SAFETY-WPS Office (1).pptx

Weitere ähnliche Inhalte

Ähnlich wie INTERNET SAFETY-WPS Office (1).pptx

cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
MILANOP1
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
jleverett
 

Ähnlich wie INTERNET SAFETY-WPS Office (1).pptx (20)

Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber Awareness
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

Kürzlich hochgeladen

Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
ZurliaSoop
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
eliklein8
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
eliklein8
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
SocioCosmos
 
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
Cara Menggugurkan Kandungan 087776558899
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
Health
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
Cara Menggugurkan Kandungan 087776558899
 
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Heena Escort Service
 

Kürzlich hochgeladen (17)

Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
Jual Obat Aborsi Kudus ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cy...
 
Enhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content MarketingEnhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content Marketing
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
 
Content strategy : Content empire and cash in
Content strategy : Content empire and cash inContent strategy : Content empire and cash in
Content strategy : Content empire and cash in
 
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
 
Marketing Plan - Social Media. The Sparks Foundation
Marketing Plan -  Social Media. The Sparks FoundationMarketing Plan -  Social Media. The Sparks Foundation
Marketing Plan - Social Media. The Sparks Foundation
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
 
The Butterfly Effect
The Butterfly EffectThe Butterfly Effect
The Butterfly Effect
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolution
 
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
 

INTERNET SAFETY-WPS Office (1).pptx

  • 2. TOOLS OF INTERNET World Wide Web (WWW): This is the part of the internet that most people are most familiar with. It's the system of interconnected documents and other resources that can be accessed via a web browser. Domain: A domain is the part of a web address that identifies a particular website. For example, in the web address "www.example.com", "example.com" is the domain
  • 3. • IP address: An IP address is a numerical label Router: A router is a device that connects computer networks together and allows data to be transmitted between them. It routes data packets between devices on a network.each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: it identifies the host or device, and it provides the location of the host in the network. • Server: A server is a computer that provides services to other computers or devices. For example, a web server is a computer that stores and serves web pages to users. • Router: A router is a device that connects computer networks together and allows data to be transmitted between them. It routes data packets between devices on a network.
  • 4. • Use strong and unique passwords: Use a combination of letters, numbers, and special characters in your passwords and make sure to use different passwords for different accounts. • Enable two-factor authentication: This adds an extra layer of security to your accounts by requiring you to enter a code sent to your phone or email in addition to your password. • Be Careful Who You Meet Online-People you meet online are not always who they claim to be. Indeed, they may not even be real. As InfoWorld reports, fake social media profiles are a popular way for hackers to cozy up to unwary Web users and pick their cyber
  • 5. • Keep Personal Information Professional and Limited- Potential employers or customers don't need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn't hand purely personal information out to strangers individually—don't hand it out to millions of people online. • . Keep Your Privacy Settings On-Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing and social media usage. But you can take charge of your information. As noted by Lifehacker, both web browsers and mobile operating systems have settings available to protect your privacy online. Major websites like Facebook also have privacy-enhancing settings available.
  • 6. • Be cautious of phishing attacks: Be wary of emails or website that ask for personal information or login credentials. If you're unsure about the legitimacy of an email or website, do some research or contact the company directly. • Install anti-virus software: This can help protect your computer from malware and viruses that can steal your personal information or damage your system. • Be mindful of what you share online: Think twice before posting personal information or photos online, and be cautious about accepting friend requests from strangers
  • 7. • Make Sure Your Internet Connection is Secure.- Use a Secure VPN Connectionimprove your Internet browsing safety, use secure VPN connection (virtual private network ). VPN enables you to have a secure connection between your device and an Internet server that no one can monitor or access the data that you’re exchanging. • Make Online Purchases From Secure Sites-Any time you make a purchase online, you need to provide credit card or bank account information—just what cybercriminals are most eager to get their hands on. Only supply this information to sites that provide secure, encrypted connections.
  • 8. TYPES OF INTERNET ISSUES •Malware- • Malware is one of the types of attacks that need maximum defense by a Cyber Safety system. Typically, malware enters your system/ network and denies access to the critical components of the network. There are various types of it such as- • Viruses-A virus usually comes as an attachment in an email that holds a virus payload, or the part of the malware that performs the malicious action. Once the victim opens the file, the device is infected. • Spyware-Spyware is a program installed on your computer, usually without your explicit knowledge, that captures and transmits personal information or Internet browsing habits and details to its user.
  • 9. •PHISING- • Phising attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim’s machine. Phishing is a common type of cyber attack that everyone should learn about in order to protect themselves.Phishing starts with a fraudulent email or other communication that is designed to lure a victim. The message is made to look as though it comes from a trusted sender. If it fools the victim, he or she is coaxed into providing confidential information, often on a scam website.
  • 10. CYBER SECURITY A cyber security threat refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations or damage information. Cyber threats can originate from various actors, including corporate spies, hacktivists, terrorist groups, hostile nation-states, criminal organizations, lone hackers and disgruntled employees.
  • 11. CYBER BULLYING Cyberbullying is the act of using the internet to harm someone. There are various forms of cyberbullying. Flaming – This type of cyberbullying involves online fights with angry and vulgar messages. Harassment – Online harassment can take the form of insulting, mean, and derogatory messages online. Denigration – Denigration is when someone posts rumors or gossip about someone online, with the purpose of damaging their reputation. Impersonation – Impersonation means pretending to be someone else to get them in trouble. Outing – Outing is when someone shares somebody else’s secrets, images or information online. Trickery – When people trick someone into revealing things and then post them online, it’s called Trickery. Exclusion – Exclusion is when an individual or a group of people intentionally keeps someone out of an online group. Cyberstalking – Cyberstalking is usually done to create fear in an individual using repeated harassment and denigration.
  • 12. CYBER BULLYING PREVENTION TIPS FOR STUDENTS • TALK ABOUT IT.- If you’re the target of cyberbullying. Whether it’s your parents, a teacher, or another trusted adult, or even your best friend, never keep to yourself the fact that you’re being bullied. • IGNORE THEM- If there is an isolated incident where you are being bullied, don’t respond to the instigator. Those who cyberbully but who do not get a response from their target may just move on.
  • 13. • NEVER RETALIATE- Be the bigger person and never retaliate against someone who is mean to you. Retaliation only further perpetuates the cycle of violence, and does nothing to solve the problem. • SAVE THE EVIDENCE-. Record all instances of cyberbullying. Print out social media posts and emails, save texts, and capture screen shots when cyberbullying occurs. You can even make screen recordings of Snapchat, Facebook, or Instagram Stories. • REPORT IT TO THE CONTENT PROVIDER.- If don’t know who is cyberbullying you, contact the provider of the site or platform where the cyberbullying is occurring and make a report.