SlideShare ist ein Scribd-Unternehmen logo
1 von 19
HELLO
EVERYONE!
I AM GOING TO PRESENT
A PPT PRESENTATION OF
CYBER SAFETY.
HOPE YOU WILL ENJOY!!
CYBER SAFETY
CYBERBULLING
 involves the use of electronic
devices
 supports deliberate, repeated,
and hostile behavior by an
individual or group
 its intent is to harm others.
What is Cyberbullying
 According to a survey done in 2007 by
the National Crime and Protection
Council:​
 43% of teens report that they have
experienced some form of cyberbullying
that year.
 The incidence of cyberbullying is higher
among females than males. More
than 50% of females age 15 to 16 years
of age reported at least one
cyberbullying incident.
Why do teens cyberbully?
 81% Because they think it is funny​
 64% Because they don’t like the
person​
 45% Because they view the victim as
a loser​
 47% Because they feel there are no
consequences for cyberbullying
 45% Because they don’t think they will
get caught​
 58% of students surveyed don’t think
 cyberbullying is a big deal​
Stop Cyber bullying
Rachael was stalked online by
anonymous bully. She died by suicide
on October 9, 2006.
Stop Cyber bullying
Ryan, a 13-year old, who died by
suicide as a result of bullying at school
and online.
Stop Cyber bullying
 A cruel online hoax by a neighbor led
to the suicide death of Megan.
What is a cyber-predator?
 A cyber-predator uses the internet to
hunt for victims to take advantage of
them in some way:
 Emotionally
 Sexually
 Psychologically
 Financially
A cyber-predator knows how to
manipulate people by creating trust and
friendships where none should exist.
What is a cyber-predator?
 77% of the target for online predators
are teens aged 14 and older.
 33% of teens received an aggressive
sexual solicitation online in the past
year.
 75% of children are willing to share
personal information online about
themselves and their family in
exchange for goods and services
What is Phishing
 Phishing is the act of requesting
confidential information over the
Internet under false pretenses in order
to fraudulently obtain credit card
numbers, passwords, or other
personal data.
Phishing
 15% of online teens have received a
fraudulent message, compared with
22% of adults.
 If you click on an application and the
URL does not have www.facebook or
has a URL that is just numbers like
10.263.18, immediately exit out of that
page.
 Always check your URL when
navigating in social networks like
MySpace and Facebook.
How to stop the bad guys
 1.Be suspicious of any email with
urgent requests for personal financial
information. DO NOT RESPOND TO
IT!
 Phisher emails are typically NOT
personalized
 Valid messages from your bank
ecommerce company generally are
How to stop the bad guys
 2.If you suspect an email message
might not be authentic . . .Don't use
the embedded links to get to another
web page.
 Call the company on the telephone, or
log onto the website directly by typing
the URL into the address bar
 Don’t cut and paste the link from the
message into your Internet browser –
the phisers can redirect you to a
different site
How to stop the bad guys
 3. Avoid filling out forms in email
messages that ask for personal
financial information.
 Phishers make very good fake forms
 Only communicate personal financial
information via a secure website or the
telephone
How to stop the bad guys
 4. Don’t email personal or financial
information.
 Email is not a secure method of
transmitting personal information
 No one indicator is foolproof
 Some phishers have forged security
icons like the lock icon on an order
form
How to stop the bad guys
 5. Always ensure that you're using a
secure website when submitting credit
card or other sensitive information via
your Web browser.
 Check the beginning of the Web
address in your browsers address bar
 It should begin with "https://" rather
than just "http://".
How to stop the bad guys
 6.When shopping for an item on the
Internet
 Be sure the site is secure (https:
instead of http) before entering
personal financial information!
CYBER SAFETY
 SO THANKS EVERYONE AND NOW
I HOPE YOU ALL HAD
UNDERSTOOD UBOUT CYBER
SAFETY.
 SO BE SAFE.
THANKS!

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Internet safety
Internet safety Internet safety
Internet safety
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 

Ähnlich wie Cyber safety

Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueMindMake - Parenting & Education
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tantaSamir Deutsch
 
My protection plan
My protection planMy protection plan
My protection planShakena12
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet SafetySage Lewis
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsShred Station
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The InternetDebra Boardman
 
Inter safety 2011
Inter safety 2011Inter safety 2011
Inter safety 2011temgamarra
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101Chad Richards
 

Ähnlich wie Cyber safety (20)

Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
123.pptx
123.pptx123.pptx
123.pptx
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tanta
 
My protection plan
My protection planMy protection plan
My protection plan
 
Teaching Cyber Safety
Teaching Cyber SafetyTeaching Cyber Safety
Teaching Cyber Safety
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Cyber
CyberCyber
Cyber
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Inter safety 2011
Inter safety 2011Inter safety 2011
Inter safety 2011
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
 

Mehr von Shruti Bansal

ART INTERGRATED PROJECT ON PUNJAB AND ANDHRA PRADESH
ART INTERGRATED PROJECT ON PUNJAB AND ANDHRA PRADESHART INTERGRATED PROJECT ON PUNJAB AND ANDHRA PRADESH
ART INTERGRATED PROJECT ON PUNJAB AND ANDHRA PRADESHShruti Bansal
 
LIFE OF MAHARANA PRATAP-THE GREAT WARRIOR
LIFE OF MAHARANA PRATAP-THE GREAT WARRIORLIFE OF MAHARANA PRATAP-THE GREAT WARRIOR
LIFE OF MAHARANA PRATAP-THE GREAT WARRIORShruti Bansal
 
HOW TO EAT A BALANCED DIET?
HOW TO EAT A BALANCED DIET?HOW TO EAT A BALANCED DIET?
HOW TO EAT A BALANCED DIET?Shruti Bansal
 
APJ ABDUL KALAM.pptx
APJ ABDUL KALAM.pptxAPJ ABDUL KALAM.pptx
APJ ABDUL KALAM.pptxShruti Bansal
 
EARTH-OUR BEAUTIFUL HOME.pptx
EARTH-OUR BEAUTIFUL HOME.pptxEARTH-OUR BEAUTIFUL HOME.pptx
EARTH-OUR BEAUTIFUL HOME.pptxShruti Bansal
 
7 WONDERS OF THE WORLD
7 WONDERS OF THE WORLD7 WONDERS OF THE WORLD
7 WONDERS OF THE WORLDShruti Bansal
 
ENVIRONMENTAL CONCERNS
ENVIRONMENTAL CONCERNSENVIRONMENTAL CONCERNS
ENVIRONMENTAL CONCERNSShruti Bansal
 
ONLINE EDUCATION.pptx
ONLINE EDUCATION.pptxONLINE EDUCATION.pptx
ONLINE EDUCATION.pptxShruti Bansal
 
THE QUEEN OF JHANSI-RANI LAXMI BAI
THE QUEEN OF JHANSI-RANI LAXMI BAITHE QUEEN OF JHANSI-RANI LAXMI BAI
THE QUEEN OF JHANSI-RANI LAXMI BAIShruti Bansal
 
IMPORTANCE OF EDUCATION
IMPORTANCE OF EDUCATIONIMPORTANCE OF EDUCATION
IMPORTANCE OF EDUCATIONShruti Bansal
 

Mehr von Shruti Bansal (15)

ART INTERGRATED PROJECT ON PUNJAB AND ANDHRA PRADESH
ART INTERGRATED PROJECT ON PUNJAB AND ANDHRA PRADESHART INTERGRATED PROJECT ON PUNJAB AND ANDHRA PRADESH
ART INTERGRATED PROJECT ON PUNJAB AND ANDHRA PRADESH
 
LIFE OF MAHARANA PRATAP-THE GREAT WARRIOR
LIFE OF MAHARANA PRATAP-THE GREAT WARRIORLIFE OF MAHARANA PRATAP-THE GREAT WARRIOR
LIFE OF MAHARANA PRATAP-THE GREAT WARRIOR
 
HOW TO EAT A BALANCED DIET?
HOW TO EAT A BALANCED DIET?HOW TO EAT A BALANCED DIET?
HOW TO EAT A BALANCED DIET?
 
APJ ABDUL KALAM.pptx
APJ ABDUL KALAM.pptxAPJ ABDUL KALAM.pptx
APJ ABDUL KALAM.pptx
 
EARTH-OUR BEAUTIFUL HOME.pptx
EARTH-OUR BEAUTIFUL HOME.pptxEARTH-OUR BEAUTIFUL HOME.pptx
EARTH-OUR BEAUTIFUL HOME.pptx
 
7 WONDERS OF THE WORLD
7 WONDERS OF THE WORLD7 WONDERS OF THE WORLD
7 WONDERS OF THE WORLD
 
ENVIRONMENTAL CONCERNS
ENVIRONMENTAL CONCERNSENVIRONMENTAL CONCERNS
ENVIRONMENTAL CONCERNS
 
ONLINE EDUCATION.pptx
ONLINE EDUCATION.pptxONLINE EDUCATION.pptx
ONLINE EDUCATION.pptx
 
MOTHER TERESA
MOTHER TERESAMOTHER TERESA
MOTHER TERESA
 
THE QUEEN OF JHANSI-RANI LAXMI BAI
THE QUEEN OF JHANSI-RANI LAXMI BAITHE QUEEN OF JHANSI-RANI LAXMI BAI
THE QUEEN OF JHANSI-RANI LAXMI BAI
 
IMPORTANCE OF EDUCATION
IMPORTANCE OF EDUCATIONIMPORTANCE OF EDUCATION
IMPORTANCE OF EDUCATION
 
Animal testing
Animal testingAnimal testing
Animal testing
 
Swami vivekananda
Swami vivekanandaSwami vivekananda
Swami vivekananda
 
Importance of trees
Importance of treesImportance of trees
Importance of trees
 
Carnatic music
Carnatic   musicCarnatic   music
Carnatic music
 

Kürzlich hochgeladen

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 

Kürzlich hochgeladen (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 

Cyber safety

  • 1. HELLO EVERYONE! I AM GOING TO PRESENT A PPT PRESENTATION OF CYBER SAFETY. HOPE YOU WILL ENJOY!!
  • 3. CYBERBULLING  involves the use of electronic devices  supports deliberate, repeated, and hostile behavior by an individual or group  its intent is to harm others.
  • 4. What is Cyberbullying  According to a survey done in 2007 by the National Crime and Protection Council:​  43% of teens report that they have experienced some form of cyberbullying that year.  The incidence of cyberbullying is higher among females than males. More than 50% of females age 15 to 16 years of age reported at least one cyberbullying incident.
  • 5. Why do teens cyberbully?  81% Because they think it is funny​  64% Because they don’t like the person​  45% Because they view the victim as a loser​  47% Because they feel there are no consequences for cyberbullying  45% Because they don’t think they will get caught​  58% of students surveyed don’t think  cyberbullying is a big deal​
  • 6. Stop Cyber bullying Rachael was stalked online by anonymous bully. She died by suicide on October 9, 2006.
  • 7. Stop Cyber bullying Ryan, a 13-year old, who died by suicide as a result of bullying at school and online.
  • 8. Stop Cyber bullying  A cruel online hoax by a neighbor led to the suicide death of Megan.
  • 9. What is a cyber-predator?  A cyber-predator uses the internet to hunt for victims to take advantage of them in some way:  Emotionally  Sexually  Psychologically  Financially A cyber-predator knows how to manipulate people by creating trust and friendships where none should exist.
  • 10. What is a cyber-predator?  77% of the target for online predators are teens aged 14 and older.  33% of teens received an aggressive sexual solicitation online in the past year.  75% of children are willing to share personal information online about themselves and their family in exchange for goods and services
  • 11. What is Phishing  Phishing is the act of requesting confidential information over the Internet under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.
  • 12. Phishing  15% of online teens have received a fraudulent message, compared with 22% of adults.  If you click on an application and the URL does not have www.facebook or has a URL that is just numbers like 10.263.18, immediately exit out of that page.  Always check your URL when navigating in social networks like MySpace and Facebook.
  • 13. How to stop the bad guys  1.Be suspicious of any email with urgent requests for personal financial information. DO NOT RESPOND TO IT!  Phisher emails are typically NOT personalized  Valid messages from your bank ecommerce company generally are
  • 14. How to stop the bad guys  2.If you suspect an email message might not be authentic . . .Don't use the embedded links to get to another web page.  Call the company on the telephone, or log onto the website directly by typing the URL into the address bar  Don’t cut and paste the link from the message into your Internet browser – the phisers can redirect you to a different site
  • 15. How to stop the bad guys  3. Avoid filling out forms in email messages that ask for personal financial information.  Phishers make very good fake forms  Only communicate personal financial information via a secure website or the telephone
  • 16. How to stop the bad guys  4. Don’t email personal or financial information.  Email is not a secure method of transmitting personal information  No one indicator is foolproof  Some phishers have forged security icons like the lock icon on an order form
  • 17. How to stop the bad guys  5. Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser.  Check the beginning of the Web address in your browsers address bar  It should begin with "https://" rather than just "http://".
  • 18. How to stop the bad guys  6.When shopping for an item on the Internet  Be sure the site is secure (https: instead of http) before entering personal financial information!
  • 19. CYBER SAFETY  SO THANKS EVERYONE AND NOW I HOPE YOU ALL HAD UNDERSTOOD UBOUT CYBER SAFETY.  SO BE SAFE. THANKS!