And Cyber Defense Internet Safety for Kids Cyber Criminals
Notice Cyber criminals operate internet crimes which worry and disturb many internet users. Protect yourself with Cyber De...
Wanted <ul><li>Hector the Hacker </li></ul><ul><ul><li>Junk the Spammer </li></ul></ul><ul><ul><li>Sly the Spy </li></ul><...
Hector the Hacker Specialty :  Hacking Violation : Break security system and change  computer system inappropriately Last ...
Junk the Spammer Specialty :  Spamming Violation : Send tons of unwanted email to  your mailbox Last location seen : Untru...
Sly the Spy Specialty :  Stealing Violation : Steal your username, password and  other private information Last location s...
Hunter the Predator Specialty :  Cyber stalking Violation : Trick you to meet them offline to  abuse you Last location see...
Scrap the Copycat Specialty :  Scrapping Violation : Steal other people works and claim  to be the author Last location se...
End of Notice Visit our headquarter at Copyright 2009
Upcoming SlideShare
Loading in …5
×

Cyber Criminals And Cyber Defense

1,027
-1

Published on

Internet safety tips for kids - Understanding Internet Crimes and how to apply Cyber Defense

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,027
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
69
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber Criminals And Cyber Defense

  1. 1. And Cyber Defense Internet Safety for Kids Cyber Criminals
  2. 2. Notice Cyber criminals operate internet crimes which worry and disturb many internet users. Protect yourself with Cyber Defense to avoid being their prey.
  3. 3. Wanted <ul><li>Hector the Hacker </li></ul><ul><ul><li>Junk the Spammer </li></ul></ul><ul><ul><li>Sly the Spy </li></ul></ul><ul><ul><li>Hunter the Predator </li></ul></ul><ul><ul><li>Scrap the Copycat </li></ul></ul>
  4. 4. Hector the Hacker Specialty : Hacking Violation : Break security system and change computer system inappropriately Last location seen : Any unsafe internet connection which is not protected Cyber Defense : Install Firewall Software
  5. 5. Junk the Spammer Specialty : Spamming Violation : Send tons of unwanted email to your mailbox Last location seen : Untrusted websites which require your email address Cyber Defense : Keep your email private
  6. 6. Sly the Spy Specialty : Stealing Violation : Steal your username, password and other private information Last location seen : Inside software or other files downloaded from untrusted websites Cyber Defense : Install AntiSpyware Software
  7. 7. Hunter the Predator Specialty : Cyber stalking Violation : Trick you to meet them offline to abuse you Last location seen : General chat rooms and social network websites Cyber Defense : Don’t chat with strangers
  8. 8. Scrap the Copycat Specialty : Scrapping Violation : Steal other people works and claim to be the author Last location seen : Quoted texts from other sources without citation Cyber Defense : Copyright your work
  9. 9. End of Notice Visit our headquarter at Copyright 2009
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×