SlideShare a Scribd company logo
1 of 24
We all have been acquainted with one
of the
greatest inventions of mankind, the
Internet.
The Internet is an astounding place
It contains information about every
topic the human brain can
fathom.
The amount of data it holds is leagues
beyond the imagination of the mind.
• 20% of kids cyberbullied think
about suicide, and 1 in 10 attempt it.
• 42% of teenagers with tech access
report being cyberbullied over the
past year.
• Over 25% of adolescent and teens
have been bullied repeatedly through
their mobile phones or the internet.
What is Cyber Bullying
• Sending mean messages or threats to a person’s email account or cell phone.
• Spreading rumors online or through texts.
• Posting hurtful or threatening messages on social networking sites or web pages.
• Stealing a person’s account information to break into their account and send damaging
messages
• Pretending to be someone else online to hurt another person.
• Taking unflattering pictures of a person and spreading them through mobile phones or the
internet.
As the quote goes,
“Prevention is better cure”
so we will as well make an attempt
to go cyber safe so that we don’t
end up opening
the
‘Pandora’s Box of the digital world.
What could be done ?
• Be kind to others and use netiquette (no flooding, be nice
to newbies, avoid using all caps, and set a good tone.
• Don’t give out personal information like PIN, Password,
Home Address, Phone Number, etc.
• Be strong and stop it early. Don’t stoop to their level and
lash back. Don’t suffer in silence.
• Contact your Internet Service Provider
Abuse Department. If the problem
continues, alert the local Police
Department.
• If anything makes you feel uncomfortable
online, while gaming or using your mobile
phone, talk with your parents or guardian
right away.
• Avoid exchanging pictures or give out e-mail
address and personal information to people you
meet online.
• Never post your personal information such as
mobile number, home number, home address, or
your location on any social networking sites or
through mobile apps like Facebook & Instagram.
• Don’t always trust your newfound online friends.
Remember, the predator waits patiently.
• Make Passwords long and strong. Use combination of
lower and uppercase letters along with symbols.
• Links in e-mail, tweets, posts and online advertising
are often the way cybercriminals compromise your
computer. If it looks suspicious, even if you know the
source, it’s best to delete or if appropriate, mark as
junk mail.
• The internet haserasedout our livesremarkablybut at sametimeopened
a fewdoorsto malice.
• So, it is our dutyto keepthosedoors locked

More Related Content

What's hot

Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquetteguestc38192
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonEva Buyuksimkesyan
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for StudentsKelgator
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquettedhabyahalk
 
Cyber safety training for 6th grade
Cyber safety training for 6th gradeCyber safety training for 6th grade
Cyber safety training for 6th gradePamela Taylor
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineIan Krieger
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying jun ijan
 
Digital literacy
Digital literacyDigital literacy
Digital literacyAmanda lee
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetydpl
 
Crosbye digitialcitizenship
Crosbye digitialcitizenshipCrosbye digitialcitizenship
Crosbye digitialcitizenshipcrosbye
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 

What's hot (20)

Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquette
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
 
Digital citizenship for Students
Digital citizenship for StudentsDigital citizenship for Students
Digital citizenship for Students
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Cyber safety training for 6th grade
Cyber safety training for 6th gradeCyber safety training for 6th grade
Cyber safety training for 6th grade
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberbullying!!!
Cyberbullying!!! Cyberbullying!!!
Cyberbullying!!!
 
Uno Digital Etiquette
Uno Digital EtiquetteUno Digital Etiquette
Uno Digital Etiquette
 
Crosbye digitialcitizenship
Crosbye digitialcitizenshipCrosbye digitialcitizenship
Crosbye digitialcitizenship
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 

Similar to Cyber Safety

CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramDaniel Hanttula
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentationrenumann
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
CyberbullyingspecR Smith
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfCharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingR Smith
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
My protection plan
My protection planMy protection plan
My protection planShakena12
 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbullingalsebastino
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 

Similar to Cyber Safety (20)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
My protection plan
My protection planMy protection plan
My protection plan
 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbulling
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Cyber Safety

  • 1.
  • 2.
  • 3. We all have been acquainted with one of the greatest inventions of mankind, the Internet. The Internet is an astounding place It contains information about every topic the human brain can fathom. The amount of data it holds is leagues beyond the imagination of the mind.
  • 4.
  • 5.
  • 6. • 20% of kids cyberbullied think about suicide, and 1 in 10 attempt it. • 42% of teenagers with tech access report being cyberbullied over the past year. • Over 25% of adolescent and teens have been bullied repeatedly through their mobile phones or the internet.
  • 7. What is Cyber Bullying • Sending mean messages or threats to a person’s email account or cell phone. • Spreading rumors online or through texts. • Posting hurtful or threatening messages on social networking sites or web pages. • Stealing a person’s account information to break into their account and send damaging messages • Pretending to be someone else online to hurt another person. • Taking unflattering pictures of a person and spreading them through mobile phones or the internet.
  • 8.
  • 9. As the quote goes, “Prevention is better cure” so we will as well make an attempt to go cyber safe so that we don’t end up opening the ‘Pandora’s Box of the digital world.
  • 10.
  • 11.
  • 12. What could be done ? • Be kind to others and use netiquette (no flooding, be nice to newbies, avoid using all caps, and set a good tone. • Don’t give out personal information like PIN, Password, Home Address, Phone Number, etc. • Be strong and stop it early. Don’t stoop to their level and lash back. Don’t suffer in silence.
  • 13.
  • 14. • Contact your Internet Service Provider Abuse Department. If the problem continues, alert the local Police Department. • If anything makes you feel uncomfortable online, while gaming or using your mobile phone, talk with your parents or guardian right away.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. • Avoid exchanging pictures or give out e-mail address and personal information to people you meet online. • Never post your personal information such as mobile number, home number, home address, or your location on any social networking sites or through mobile apps like Facebook & Instagram.
  • 20. • Don’t always trust your newfound online friends. Remember, the predator waits patiently. • Make Passwords long and strong. Use combination of lower and uppercase letters along with symbols. • Links in e-mail, tweets, posts and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk mail.
  • 21.
  • 22.
  • 23.
  • 24. • The internet haserasedout our livesremarkablybut at sametimeopened a fewdoorsto malice. • So, it is our dutyto keepthosedoors locked