SlideShare a Scribd company logo
1 of 67
Cyber Safety
Dr.Suresh Kumar Murugesan PhD
Yellow
Pond
About the Presenter
● Dr.Suresh Kumar Murugesan is a passionate Professor and
Researcher from Madurai, Tamil Nadu, India
● At present he is Heading the department of Psychology, The
American College, Madurai and Adjunct Professor of School of
Behavioural Sciences and Education at TAU
● He is very keen in learning new research studies in behavioural
Sciences and open to learn.
● His ultimate aim is to make impression in the field of Knowledge
● His area of specializations are Psychometry, Positive
Psychotherapy and Cyber Psychology
Yellow
Pond
Disclaimer
● This presentation is prepared for learning
purpose only and all the images and pictures
used in this presentation are taken from google
image search.
● Due recognition was given to all the material
collected from the various sources.
● Any name or reference is missed kindly bring it to
the notice of the presenter for inclusion.
● Email - sureshkumar800@yahoo.com Thank you
Yellow
Pond
Introduction ● Kids have more information at their fingertips than any
generation before.
● Tablets, laptops, and smartphones are common at school
and at home, including for virtual learning.
● The devices aren’t going away anytime soon, which is why
families should have conversations about cyber safety.
Yellow
Pond
Cyber Safety ● The internet and cyberspace has information that can
enrich our lives.
● It also can harm us and the people we love.
● Actually we want our children to have access to it, but also
want them to be safe online.
● How can we get both things?
Yellow
Pond
Cyber Safety ● How can we safe in online?
● This is the challenge of living in a connected world.
● The bad guys may be smart, but we can be smarter by
teaching the cyber safety in the beginning itself.
Yellow
Pond
Cyber Safety
● Cyber safety is the act of staying safer in
online.
● It includes being aware of the risks
associated with our online activity and
employing a few strategies to prevent or
avoid these risks.
● Cyber safety is also sometimes referred to as
○ online safety,
○ internet safety, or
○ e-safety.
Yellow
Pond
Danger of the Internet
Yellow
Pond
Dangers of the
internet
● One of the prevalent dangers of the internet is
cybercriminals and the ever evolving cyber crimes they
create.
● Because so many cyber crimes are launched to target any
internet user, it's likely that no family member is exempt of
such attacks, either.
● There are many threats children face online, as well as
adults and teens.
Yellow
Pond
Dangers of the internet
Educating the whole family on how to identify and avoid each cyber
threat is an important part of internet safety. Here are at least 10
risks or dangers of the internet to know, but be aware that new
cyber threats are constantly evolving.
● Identity theft
● Cyberbullying
● Online predators
● Faulty privacy setting
● Phishing
● Online scams
● Malware
● Inappropriate content
● Bait and switch
Yellow
Pond
Time To Act
No matter how prepared weare, sometimes, bad things happen to careful people. If any of these things
have happened, it might be time to take a stand:
● Having a friend pass on a private online conversation to someone else without your permission
● Being harassed via messages, Facebook, Twitter, email or in-game chat
● Being tricked into giving out a secret online
● Having an embarrassing picture of you posted or sent around online
● Being signed up to receive unwanted e-mails, like pornography, by someone else
● Having someone break into your account or steal your password
● Finding out that the person you're emailing, texting or messaging isn't the person you thought they
were
● Having someone pretend to be you online
● Being entered in an online poll or contest without your knowledge
● Having someone post nasty comments on your guestbook, blog, or on a discussion board
Yellow
Pond
Types of Cyber Treat
Yellow
Pond
Types of cyber
threats
The threats countered by cyber-security are
three-fold:
1. Cybercrime includes single actors or
groups targeting systems for financial
gain or to cause disruption.
2. Cyber-attack often involves politically
motivated information gathering.
3. Cyberterrorism is intended to
undermine electronic systems to cause
panic or fear.
Yellow
Pond
Malware
Yellow
Pond
Malware
● Malware means malicious software.
● One of the most common cyber threats, malware is
software that a cybercriminal or hacker has created
to disrupt or damage a legitimate user’s computer.
● Often spread via an unsolicited email attachment or
legitimate-looking download
● Malware may be used by cybercriminals to make
money or in politically motivated cyber-attacks.
Yellow
Pond
There are a number of different types
of malware, including:
● Virus
● Trojans
● Spyware
● Ransomware
● Adware
● Botnets
● SQL injection
● Phishing
● Man-in-the-middle attack
● Denial-of-service attack
Yellow
Pond
Virus
A self-replicating program that attaches itself to clean file and spreads
throughout a computer system, infecting files with malicious code.
Yellow
Pond
Trojans
A type of malware that is disguised as legitimate software. Cybercriminals trick
users into uploading Trojans onto their computer where they cause damage or
collect data.
Yellow
Pond
Spyware
A program that secretly records what a user does, so that cybercriminals can
make use of this information. For example, spyware could capture credit card
details.
Yellow
Pond
Ransomware
Malware which locks down a user’s files and data, with the threat of erasing it
unless a ransom is paid.
Yellow
Pond
Adware
Advertising software which can be used to spread malware.
Yellow
Pond
Botnets
Networks of malware infected computers which cybercriminals use to perform
tasks online without the user’s permission.
Yellow
Pond
SQL injection
● An SQL (structured language query) injection is a type of cyber-
attack used to take control of and steal data from a database.
● Cybercriminals exploit vulnerabilities in data-driven applications to
insert malicious code into a database via a malicious SQL
statement.
● This gives them access to the sensitive information contained in
the database.
Yellow
Pond
Phishing
● Phishing is when cybercriminals target victims with emails that appear to be from a legitimate company
asking for sensitive information.
● Phishing attacks are often used to dupe people into handing over credit card data and other personal
information.
Yellow
Pond
Man-in-the-middle attack
● A man-in-the-middle attack is a type of cyber threat where a cybercriminal intercepts communication
between two individuals in order to steal data.
● For example, on an unsecure WiFi network, an attacker could intercept data being passed from the
victim’s device and the network.
Yellow
Pond
Denial-of-service attack
A denial-of-service attack is where cybercriminals prevent a computer system
from fulfilling legitimate requests by overwhelming the networks and servers
with traffic. This renders the system unusable, preventing an organization from
carrying out vital functions.
Yellow
Pond
Latest cyber threats
Yellow
Pond
Latest cyber threats
Some of the most recent cyber threats that the U.K., U.S.,
and Australian governments have reported on.
● Dridex malware
● Romance scams
● Emotet malware
Yellow
Pond
Dridex malware
● In December 2019, the U.S. Department of Justice (DoJ)
charged the leader of an organized cyber-criminal group for
their part in a global Dridex malware attack. This malicious
campaign affected the public, government, infrastructure and
business worldwide.
● Dridex is a financial trojan with a range of capabilities.
Affecting victims since 2014, it infects computers though
phishing emails or existing malware. Capable of stealing
passwords, banking details and personal data which can be
used in fraudulent transactions, it has caused massive
financial losses amounting to hundreds of millions.
● In response to the Dridex attacks, the U.K.’s National Cyber
Security Centre advises the public to “ensure devices are
patched, antivirus is turned on and up to date and files are
backed up”.
Yellow
Pond
Romance scams
● In February 2020, the FBI warned U.S. citizens to be
aware of confidence fraud that cyber criminals
commit using dating sites, chat rooms and apps.
● Perpetrators take advantage of people seeking new
partners, duping victims into giving away personal
data.
● The FBI reports that romance cyber threats affected
114 victims in New Mexico in 2019, with financial
losses amounting to $1.6 million.
Yellow
Pond
Emotet malware ● In late 2019, The Australian Cyber Security Centre warned
national organizations about a widespread global cyber
threat from Emotet malware.
● Emotet is a sophisticated trojan that can steal data and
also load other malware. Emotet thrives on unsophisticated
password: a reminder of the importance of creating a
secure password to guard against cyber threats.
Yellow
Pond
Cyber Safety Tips
Yellow
Pond
Cyber safety tips
How can businesses and individuals guard against cyber threats? Here are
our top cyber safety tips:
1. Update your software and operating system: This means you
benefit from the latest security patches.
2. Use anti-virus software: Security solutions like Total Security will
detect and removes threats. Keep your software updated for the best
level of protection.
3. Use strong passwords: Ensure passwords are not easily guessable.
4. Do not open email attachments from unknown senders: These
could be infected with malware.
5. Do not click on links in emails from unknown senders or
unfamiliar websites:This is a common way that malware is spread.
6. Avoid using unsecured WiFi networks in public places: Unsecure
networks leave you vulnerable to man-in-the-middle attacks.
Yellow
Pond
Cyber Safety for Kids
Yellow
Pond
Internet safety tips for
kids
Whether they’re learning virtually, watching YouTube, or
playing games, kids are becoming digital citizens at young
age. So, it’s never too early to acquaint them with some
internet safety tips.
● Tip #1: Know the dangers of the internet
● Tip #2: Remember your identity is important
● Tip #3: Beware of strangers
● Tip #4: Watch out for phishing
● Tip #5: Choose strong passwords
Yellow
Pond
Tip #1: Know the
dangers of the internet
● When it comes to cybersecurity, kids are often one
of our family’s weakest links — and that can be for
lack of knowing the dangers of the internet.
● Teach kids about suspicious activity online and
encourage them to ask for help if something seems
unusual.
Yellow
Pond
Tip #2: Remember your
identity is important
● Sometimes kids make themselves vulnerable to identity
theft by disclosing personal information online
because they believe they have nothing to lose.
● A child’s identity can have as much value as an adult’s
identity, if not more. Scammers can trick kids into
disclosing their Aadhar number and other details that
can be used to commit identity theft.
● Remind children not to reveal too much information
about themselves.
● Their date of birth, address, and Aadhar are all
examples of personal information, and they shouldn’t
share them freely.
Yellow
Pond
Tip #3: Beware of strangers
● Offline, you’ve probably already introduced the idea
to your kids that all strangers can be potentially
dangerous.
● Remind them this also applies to their online
activities and strangers are on the internet.
● While teens may be more prone to advances from
online predators, kids can be targeted, as well.
● It’s important to teach them at a young age to be
cautious online and tell an adult if someone they
don’t know communicates with them or makes them
uncomfortable.
Yellow
Pond
Tip #4: Watch
out for phishing
● You may be sophisticated enough to know not to click on a
URL that’s supposedly from your bank or a friend, but does
everyone in your household know that?
● Teach your kids about phishing scams and warn them not
to click on URLs in an email or social network message.
Yellow
Pond
Tip #5: Choose strong
passwords
● Passwords are the primary defense against hackers.
● Many people reuse the same password for multiple
accounts and use passwords that are easy to guess,
because they’re also easy to remember.
● Teach your kids to create a hack-proof password by
selecting a combination of uppercase and lowercase
letters, numbers, and symbols, and make sure it's at
least 12 characters long.
● Never use common words, phrases, or personal
information like a phone number or family members’
names.
Yellow
Pond
Yellow
Pond
Cyber Safety for Teens
Yellow
Pond
Internet safety
tips for teens
Some teens are often more tech savvy than their parents, but
that doesn’t mean they have a strong sense of judgment or have
access to all of the tools that can help protect them online.
Help keep your tweens and teens cyber safe by introducing them
to the internet safety tips.
Yellow
Pond
Tip #6: Use a
password
management
system
● Bolster your password protection with a password
management programme, which can remember unique
passwords for all your accounts.
● Best of all, with a password manager, we only need to
remember one password.
Yellow
Pond
Tip #7: Keep your social
media accounts secure
● There’s a good chance someone in your house is on
a social network. But social media can also attract
cyber snoops and identity thieves.
● Keep a close eye on your social accounts. If
someone messages you who hasn’t done so in a
while, be suspicious. Your friend’s account may
have been hacked.
● Parents should remind teens to also never meet in
person with someone they met online and tell an
adult if a stranger is messaging them.
Yellow
Pond
Tip #8: Be careful what
you post
● It’s important for children, teens, and family
members to know how much information is too much
information.
● In their excitement to share milestones, teens may
sometimes post their personal information online.
● For example, a driver’s license or a travel itinerary
shared online could be valuable information for
identity thieves or burglars.
● Also personal or inappropriate photos can attract
online predators, or could affect future educational
or employment opportunities.
Yellow
Pond
Tip #9: Shop online only
from secure sites
● Whether teens are allowed to shop online is up to their
parents. Whether teens will listen is another story.
● Teach yours how to shop safely online by acquainting
them with some indicators of a secure website.
● One of the best indicators is whether a site is running on
HTTPS, which means the site has a security certificate
that safeguards visitors’ personal information by
encrypting their data.
● You can verify if a site runs on HTTPS by double-
checking the beginning of a URL in the address bar and
also confirming if there’s a padlock next to it.
Yellow
Pond
Yellow
Pond
Tip #10: Keep privacy
settings on
● Web browsers, mobile operations systems, and
social media channels all have settings in place to
protect your privacy, and it’s up to you to adjust
them.
● Keeping them turned off means your information
might be shared with marketers to help your
browsing experience, but it also could be intercepted
by hackers.
● Play it safe and keep your privacy settings on.
Parents should adjust kids’ devices accordingly and
teach teens how to keep the settings on themselves.
Yellow
Pond
Cyber Safety for Parents
Yellow
Pond
Internet safety
tips for parents
● There are some computer safety tools and best practices
that your kids simply don’t need to worry about.
● Parents, reference these housekeeping tips to ensure your
home is cyber safe.
Tip #11: Understand
privacy policies ...
● … and know that privacy policies may not be private.
● With more websites and applications collecting information
and using it for advertising and marketing purposes, make
sure your family knows the value of online privacy.
● Many apps have privacy policies that disclose that the apps
collect and share their users’ information.
● Kids and many adults often accept these policies without
reading them.
● Even if your settings are set to private, remember nothing is
private.
● Even the so-called private browser is not private.
● Law enforcement, website administrators, and hackers could
have access to your so-called private information.
Tip #12: Backup
data regularly
● A type of malware, ransomware is popular among
cybercriminals who can lock your computer so you can’t
access your valuable files, like your private photos or tax
information.
● One of the best ways to combat the threat of ransomware
is to backup your data regularly.
● Backup your kids’ devices, too, and teach your teens to do
the same.
Tip #13: Keep your internet
connection secure
● Almost every member of the family might access your
internet connection, and each person may have devices
also vying for your Wi-Fi's attention.
● It should come as no surprise that hackers also want to
use your home Wi-Fi network.
● Cybercriminals can hack home routers and gain access
to various internet-connected devices like home security
systems and smart doorbells.
● Make sure your home Wi-Fi system has a hard-to-crack
password and consider cybersecurity software that
identifies “intruders” on your network.
● Finally, a VPN is one of the best ways to ensure your
internet connection is secure.
Yellow
Pond
Tip #14: Monitor online
activities
● Monitoring your kids offline is enough stress.
● Thankfully, there’s some cybersecurity tools to help
you monitor their online activities.
● Install a cybersecurity software with parental
controls on your kids' devices to block certain
features on games, track kids' location, backup their
data, and manage their screen time.
Tip #15: Install a
comprehensive
cybersecurity suite
● To help every family member from clicking on the
wrong links and visiting the wrong sites, install a
comprehensive cyber safety solution that provides
protection for all your family members and their
devices.
● Your smartphone and tablet need as much
protection as your computer and laptops.
● So do your thermostat, smart doorbell, home
security system, and other internet-connected
devices.
Tip #16: When in doubt,
call support
● The best security software programmes offer 24x7
support.
● If you have any suspicion you’ve been hacked, call
for help.
● If you think your device is under malware, spyware,
or ransomware attack, call for help.
● A good security suite will have experts to help you
resolve your problem.
Cyber Safety for Whole
Family
Yellow
Pond
Internet safety tips for
the whole family
● It takes a whole family to make a home more cyber
safe.
● The internet safety tips apply to everyone under
roof.
Tip #17: Be careful what
you download
● There are more than 1.8 billion websites worldwide, and it's
no secret that some of them have malicious intent.
● A malicious website is a site that attempts to install malware
on your device, meaning anything that will disrupt computer
operation, gather your personal information, or allow
unauthorized access to your machine.
● This usually requires some action on your part, but there are
also drive-by downloads, whereby a website will attempt to
install software on your computer without asking for
permission first.
● Downloading and running security software can help defend
against these threats, but it's also worth knowing how to
diagnose if your computer has malware so you can remove
malware.
Tip #18: Go private on
public Wi-Fi
● There are a lot of risks of connecting to public Wi-Fi
networks.
● In addition to keeping your kids and teens attuned to
them, it’s important for parents to remind themselves
that hackers and cybercriminals consider public Wi-
Fi, such as in malls and coffee shops, an easy
access point to getting hold of your data.
● For this reason, always use a VPN when connecting
to public Wi-Fi.
● Don’t have a VPN? Consider if you can hold off on
internet browsing until you are home.
Tip #19: Close unused
accounts
● Unused accounts can be a rich source of personal
information for cybercriminals. Sometimes kids
create an account with their first and last name or
their birthday in the username.
● Cybercriminals can patch these data points together
and steal information from other sites that the
individual uses.
● If you think you won’t be revisiting the site, it’s best
to close the account.
Tip #20: Spend time
online together
● A good way to keep your home more cyber safe?
● Hold all of the family members accountable for their
internet safety practices and support one another
when someone faces a precarious online situation.
● As parents, that means monitoring your kids’
behaviors but also showing an interest in the sites
they’re visiting and games they’re playing so that
you can educate them on whether they’re safe.
● Keep things transparent by keeping desktop
computers in a common area and discouraging kids
from playing with tablets just in their rooms.
● Bonus tip: Spend time online together by having an
online family game night.
Yellow
Pond
Reference
1. Norton (Jan. 25, 2021). Kids safety. https://us.norton.com/internetsecurity-kids-safety-stop-stressing-10-internet-
safety-rules-to-help-keep-your-family-safe-online.html
2. https://www.virtuallibrary.info/cybersafety.html
3. https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security
4. https://www.jigsawacademy.com/blogs/cyber-security/cyber-safety
5. https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-safety-rules-and-what-not-to-do-online
Yellow
Pond

More Related Content

What's hot (20)

Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Ppt
PptPpt
Ppt
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Cyber security
Cyber security Cyber security
Cyber security
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber safety

wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Module 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxnikshaikh786
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptxMehedi Hasan
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
CYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptxCYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptxIrfanaRahim2
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 

Similar to Cyber safety (20)

wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Module 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptx
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
#CYBER SECURITY.pptx
#CYBER SECURITY.pptx#CYBER SECURITY.pptx
#CYBER SECURITY.pptx
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
techalpha07
techalpha07techalpha07
techalpha07
 
CYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptxCYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 

More from Suresh Kumar Murugesan

Jacobson's Progressive Muscle Relaxation Technique.pptx
Jacobson's Progressive Muscle Relaxation Technique.pptxJacobson's Progressive Muscle Relaxation Technique.pptx
Jacobson's Progressive Muscle Relaxation Technique.pptxSuresh Kumar Murugesan
 
Statistics in Psychology - an introduction
Statistics in Psychology  - an introduction                 Statistics in Psychology  - an introduction
Statistics in Psychology - an introduction Suresh Kumar Murugesan
 
Mindfulness exercise 03 colour breathing
Mindfulness exercise  03 colour breathingMindfulness exercise  03 colour breathing
Mindfulness exercise 03 colour breathingSuresh Kumar Murugesan
 
Selection of appropriate statistics and tools
Selection of appropriate statistics and toolsSelection of appropriate statistics and tools
Selection of appropriate statistics and toolsSuresh Kumar Murugesan
 

More from Suresh Kumar Murugesan (20)

Cyber Anxiety.pptx
Cyber Anxiety.pptxCyber Anxiety.pptx
Cyber Anxiety.pptx
 
Neuroscience of Stress.pptx
Neuroscience of Stress.pptxNeuroscience of Stress.pptx
Neuroscience of Stress.pptx
 
Neuroscience of Memory.pptx
Neuroscience of Memory.pptxNeuroscience of Memory.pptx
Neuroscience of Memory.pptx
 
Classroom Behaviours.pptx
Classroom Behaviours.pptxClassroom Behaviours.pptx
Classroom Behaviours.pptx
 
ANOVA 1.0.pptx
ANOVA 1.0.pptxANOVA 1.0.pptx
ANOVA 1.0.pptx
 
Jacobson's Progressive Muscle Relaxation Technique.pptx
Jacobson's Progressive Muscle Relaxation Technique.pptxJacobson's Progressive Muscle Relaxation Technique.pptx
Jacobson's Progressive Muscle Relaxation Technique.pptx
 
Measures of central tendency
Measures of central tendencyMeasures of central tendency
Measures of central tendency
 
Statistics in Psychology - an introduction
Statistics in Psychology  - an introduction                 Statistics in Psychology  - an introduction
Statistics in Psychology - an introduction
 
Mindfulness exercise 03 colour breathing
Mindfulness exercise  03 colour breathingMindfulness exercise  03 colour breathing
Mindfulness exercise 03 colour breathing
 
Mindfulness exercise 04 spaceship
Mindfulness exercise  04 spaceshipMindfulness exercise  04 spaceship
Mindfulness exercise 04 spaceship
 
How to raise mentally strong kids
How to raise mentally strong kidsHow to raise mentally strong kids
How to raise mentally strong kids
 
Tele counselling
Tele counsellingTele counselling
Tele counselling
 
Anxiety management strategies
Anxiety management strategiesAnxiety management strategies
Anxiety management strategies
 
Neuroscience of happiness
Neuroscience of happinessNeuroscience of happiness
Neuroscience of happiness
 
Neuroscience of gratitude
Neuroscience of gratitudeNeuroscience of gratitude
Neuroscience of gratitude
 
Personality
PersonalityPersonality
Personality
 
Neuroscience of mindfulness
Neuroscience of mindfulnessNeuroscience of mindfulness
Neuroscience of mindfulness
 
Involuntary client
Involuntary clientInvoluntary client
Involuntary client
 
Selection of appropriate statistics and tools
Selection of appropriate statistics and toolsSelection of appropriate statistics and tools
Selection of appropriate statistics and tools
 
Features of psychotherapy
Features of psychotherapyFeatures of psychotherapy
Features of psychotherapy
 

Recently uploaded

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 

Recently uploaded (20)

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 

Cyber safety

  • 1. Cyber Safety Dr.Suresh Kumar Murugesan PhD Yellow Pond
  • 2. About the Presenter ● Dr.Suresh Kumar Murugesan is a passionate Professor and Researcher from Madurai, Tamil Nadu, India ● At present he is Heading the department of Psychology, The American College, Madurai and Adjunct Professor of School of Behavioural Sciences and Education at TAU ● He is very keen in learning new research studies in behavioural Sciences and open to learn. ● His ultimate aim is to make impression in the field of Knowledge ● His area of specializations are Psychometry, Positive Psychotherapy and Cyber Psychology Yellow Pond
  • 3. Disclaimer ● This presentation is prepared for learning purpose only and all the images and pictures used in this presentation are taken from google image search. ● Due recognition was given to all the material collected from the various sources. ● Any name or reference is missed kindly bring it to the notice of the presenter for inclusion. ● Email - sureshkumar800@yahoo.com Thank you Yellow Pond
  • 4. Introduction ● Kids have more information at their fingertips than any generation before. ● Tablets, laptops, and smartphones are common at school and at home, including for virtual learning. ● The devices aren’t going away anytime soon, which is why families should have conversations about cyber safety. Yellow Pond
  • 5. Cyber Safety ● The internet and cyberspace has information that can enrich our lives. ● It also can harm us and the people we love. ● Actually we want our children to have access to it, but also want them to be safe online. ● How can we get both things? Yellow Pond
  • 6. Cyber Safety ● How can we safe in online? ● This is the challenge of living in a connected world. ● The bad guys may be smart, but we can be smarter by teaching the cyber safety in the beginning itself.
  • 8. Cyber Safety ● Cyber safety is the act of staying safer in online. ● It includes being aware of the risks associated with our online activity and employing a few strategies to prevent or avoid these risks. ● Cyber safety is also sometimes referred to as ○ online safety, ○ internet safety, or ○ e-safety. Yellow Pond
  • 9. Danger of the Internet Yellow Pond
  • 10. Dangers of the internet ● One of the prevalent dangers of the internet is cybercriminals and the ever evolving cyber crimes they create. ● Because so many cyber crimes are launched to target any internet user, it's likely that no family member is exempt of such attacks, either. ● There are many threats children face online, as well as adults and teens. Yellow Pond
  • 11. Dangers of the internet Educating the whole family on how to identify and avoid each cyber threat is an important part of internet safety. Here are at least 10 risks or dangers of the internet to know, but be aware that new cyber threats are constantly evolving. ● Identity theft ● Cyberbullying ● Online predators ● Faulty privacy setting ● Phishing ● Online scams ● Malware ● Inappropriate content ● Bait and switch Yellow Pond
  • 12. Time To Act No matter how prepared weare, sometimes, bad things happen to careful people. If any of these things have happened, it might be time to take a stand: ● Having a friend pass on a private online conversation to someone else without your permission ● Being harassed via messages, Facebook, Twitter, email or in-game chat ● Being tricked into giving out a secret online ● Having an embarrassing picture of you posted or sent around online ● Being signed up to receive unwanted e-mails, like pornography, by someone else ● Having someone break into your account or steal your password ● Finding out that the person you're emailing, texting or messaging isn't the person you thought they were ● Having someone pretend to be you online ● Being entered in an online poll or contest without your knowledge ● Having someone post nasty comments on your guestbook, blog, or on a discussion board Yellow Pond
  • 13. Types of Cyber Treat Yellow Pond
  • 14. Types of cyber threats The threats countered by cyber-security are three-fold: 1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption. 2. Cyber-attack often involves politically motivated information gathering. 3. Cyberterrorism is intended to undermine electronic systems to cause panic or fear. Yellow Pond
  • 16. Malware ● Malware means malicious software. ● One of the most common cyber threats, malware is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer. ● Often spread via an unsolicited email attachment or legitimate-looking download ● Malware may be used by cybercriminals to make money or in politically motivated cyber-attacks. Yellow Pond
  • 17. There are a number of different types of malware, including: ● Virus ● Trojans ● Spyware ● Ransomware ● Adware ● Botnets ● SQL injection ● Phishing ● Man-in-the-middle attack ● Denial-of-service attack Yellow Pond
  • 18. Virus A self-replicating program that attaches itself to clean file and spreads throughout a computer system, infecting files with malicious code. Yellow Pond
  • 19. Trojans A type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computer where they cause damage or collect data. Yellow Pond
  • 20. Spyware A program that secretly records what a user does, so that cybercriminals can make use of this information. For example, spyware could capture credit card details. Yellow Pond
  • 21. Ransomware Malware which locks down a user’s files and data, with the threat of erasing it unless a ransom is paid. Yellow Pond
  • 22. Adware Advertising software which can be used to spread malware. Yellow Pond
  • 23. Botnets Networks of malware infected computers which cybercriminals use to perform tasks online without the user’s permission. Yellow Pond
  • 24. SQL injection ● An SQL (structured language query) injection is a type of cyber- attack used to take control of and steal data from a database. ● Cybercriminals exploit vulnerabilities in data-driven applications to insert malicious code into a database via a malicious SQL statement. ● This gives them access to the sensitive information contained in the database. Yellow Pond
  • 25. Phishing ● Phishing is when cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information. ● Phishing attacks are often used to dupe people into handing over credit card data and other personal information. Yellow Pond
  • 26. Man-in-the-middle attack ● A man-in-the-middle attack is a type of cyber threat where a cybercriminal intercepts communication between two individuals in order to steal data. ● For example, on an unsecure WiFi network, an attacker could intercept data being passed from the victim’s device and the network. Yellow Pond
  • 27. Denial-of-service attack A denial-of-service attack is where cybercriminals prevent a computer system from fulfilling legitimate requests by overwhelming the networks and servers with traffic. This renders the system unusable, preventing an organization from carrying out vital functions. Yellow Pond
  • 29. Latest cyber threats Some of the most recent cyber threats that the U.K., U.S., and Australian governments have reported on. ● Dridex malware ● Romance scams ● Emotet malware Yellow Pond
  • 30. Dridex malware ● In December 2019, the U.S. Department of Justice (DoJ) charged the leader of an organized cyber-criminal group for their part in a global Dridex malware attack. This malicious campaign affected the public, government, infrastructure and business worldwide. ● Dridex is a financial trojan with a range of capabilities. Affecting victims since 2014, it infects computers though phishing emails or existing malware. Capable of stealing passwords, banking details and personal data which can be used in fraudulent transactions, it has caused massive financial losses amounting to hundreds of millions. ● In response to the Dridex attacks, the U.K.’s National Cyber Security Centre advises the public to “ensure devices are patched, antivirus is turned on and up to date and files are backed up”. Yellow Pond
  • 31. Romance scams ● In February 2020, the FBI warned U.S. citizens to be aware of confidence fraud that cyber criminals commit using dating sites, chat rooms and apps. ● Perpetrators take advantage of people seeking new partners, duping victims into giving away personal data. ● The FBI reports that romance cyber threats affected 114 victims in New Mexico in 2019, with financial losses amounting to $1.6 million. Yellow Pond
  • 32. Emotet malware ● In late 2019, The Australian Cyber Security Centre warned national organizations about a widespread global cyber threat from Emotet malware. ● Emotet is a sophisticated trojan that can steal data and also load other malware. Emotet thrives on unsophisticated password: a reminder of the importance of creating a secure password to guard against cyber threats. Yellow Pond
  • 34. Cyber safety tips How can businesses and individuals guard against cyber threats? Here are our top cyber safety tips: 1. Update your software and operating system: This means you benefit from the latest security patches. 2. Use anti-virus software: Security solutions like Total Security will detect and removes threats. Keep your software updated for the best level of protection. 3. Use strong passwords: Ensure passwords are not easily guessable. 4. Do not open email attachments from unknown senders: These could be infected with malware. 5. Do not click on links in emails from unknown senders or unfamiliar websites:This is a common way that malware is spread. 6. Avoid using unsecured WiFi networks in public places: Unsecure networks leave you vulnerable to man-in-the-middle attacks. Yellow Pond
  • 35. Cyber Safety for Kids Yellow Pond
  • 36. Internet safety tips for kids Whether they’re learning virtually, watching YouTube, or playing games, kids are becoming digital citizens at young age. So, it’s never too early to acquaint them with some internet safety tips. ● Tip #1: Know the dangers of the internet ● Tip #2: Remember your identity is important ● Tip #3: Beware of strangers ● Tip #4: Watch out for phishing ● Tip #5: Choose strong passwords Yellow Pond
  • 37. Tip #1: Know the dangers of the internet ● When it comes to cybersecurity, kids are often one of our family’s weakest links — and that can be for lack of knowing the dangers of the internet. ● Teach kids about suspicious activity online and encourage them to ask for help if something seems unusual. Yellow Pond
  • 38. Tip #2: Remember your identity is important ● Sometimes kids make themselves vulnerable to identity theft by disclosing personal information online because they believe they have nothing to lose. ● A child’s identity can have as much value as an adult’s identity, if not more. Scammers can trick kids into disclosing their Aadhar number and other details that can be used to commit identity theft. ● Remind children not to reveal too much information about themselves. ● Their date of birth, address, and Aadhar are all examples of personal information, and they shouldn’t share them freely. Yellow Pond
  • 39. Tip #3: Beware of strangers ● Offline, you’ve probably already introduced the idea to your kids that all strangers can be potentially dangerous. ● Remind them this also applies to their online activities and strangers are on the internet. ● While teens may be more prone to advances from online predators, kids can be targeted, as well. ● It’s important to teach them at a young age to be cautious online and tell an adult if someone they don’t know communicates with them or makes them uncomfortable. Yellow Pond
  • 40. Tip #4: Watch out for phishing ● You may be sophisticated enough to know not to click on a URL that’s supposedly from your bank or a friend, but does everyone in your household know that? ● Teach your kids about phishing scams and warn them not to click on URLs in an email or social network message. Yellow Pond
  • 41. Tip #5: Choose strong passwords ● Passwords are the primary defense against hackers. ● Many people reuse the same password for multiple accounts and use passwords that are easy to guess, because they’re also easy to remember. ● Teach your kids to create a hack-proof password by selecting a combination of uppercase and lowercase letters, numbers, and symbols, and make sure it's at least 12 characters long. ● Never use common words, phrases, or personal information like a phone number or family members’ names. Yellow Pond
  • 43. Cyber Safety for Teens Yellow Pond
  • 44. Internet safety tips for teens Some teens are often more tech savvy than their parents, but that doesn’t mean they have a strong sense of judgment or have access to all of the tools that can help protect them online. Help keep your tweens and teens cyber safe by introducing them to the internet safety tips. Yellow Pond
  • 45. Tip #6: Use a password management system ● Bolster your password protection with a password management programme, which can remember unique passwords for all your accounts. ● Best of all, with a password manager, we only need to remember one password. Yellow Pond
  • 46. Tip #7: Keep your social media accounts secure ● There’s a good chance someone in your house is on a social network. But social media can also attract cyber snoops and identity thieves. ● Keep a close eye on your social accounts. If someone messages you who hasn’t done so in a while, be suspicious. Your friend’s account may have been hacked. ● Parents should remind teens to also never meet in person with someone they met online and tell an adult if a stranger is messaging them. Yellow Pond
  • 47. Tip #8: Be careful what you post ● It’s important for children, teens, and family members to know how much information is too much information. ● In their excitement to share milestones, teens may sometimes post their personal information online. ● For example, a driver’s license or a travel itinerary shared online could be valuable information for identity thieves or burglars. ● Also personal or inappropriate photos can attract online predators, or could affect future educational or employment opportunities. Yellow Pond
  • 48. Tip #9: Shop online only from secure sites ● Whether teens are allowed to shop online is up to their parents. Whether teens will listen is another story. ● Teach yours how to shop safely online by acquainting them with some indicators of a secure website. ● One of the best indicators is whether a site is running on HTTPS, which means the site has a security certificate that safeguards visitors’ personal information by encrypting their data. ● You can verify if a site runs on HTTPS by double- checking the beginning of a URL in the address bar and also confirming if there’s a padlock next to it. Yellow Pond
  • 50. Tip #10: Keep privacy settings on ● Web browsers, mobile operations systems, and social media channels all have settings in place to protect your privacy, and it’s up to you to adjust them. ● Keeping them turned off means your information might be shared with marketers to help your browsing experience, but it also could be intercepted by hackers. ● Play it safe and keep your privacy settings on. Parents should adjust kids’ devices accordingly and teach teens how to keep the settings on themselves. Yellow Pond
  • 51. Cyber Safety for Parents Yellow Pond
  • 52. Internet safety tips for parents ● There are some computer safety tools and best practices that your kids simply don’t need to worry about. ● Parents, reference these housekeeping tips to ensure your home is cyber safe.
  • 53. Tip #11: Understand privacy policies ... ● … and know that privacy policies may not be private. ● With more websites and applications collecting information and using it for advertising and marketing purposes, make sure your family knows the value of online privacy. ● Many apps have privacy policies that disclose that the apps collect and share their users’ information. ● Kids and many adults often accept these policies without reading them. ● Even if your settings are set to private, remember nothing is private. ● Even the so-called private browser is not private. ● Law enforcement, website administrators, and hackers could have access to your so-called private information.
  • 54. Tip #12: Backup data regularly ● A type of malware, ransomware is popular among cybercriminals who can lock your computer so you can’t access your valuable files, like your private photos or tax information. ● One of the best ways to combat the threat of ransomware is to backup your data regularly. ● Backup your kids’ devices, too, and teach your teens to do the same.
  • 55. Tip #13: Keep your internet connection secure ● Almost every member of the family might access your internet connection, and each person may have devices also vying for your Wi-Fi's attention. ● It should come as no surprise that hackers also want to use your home Wi-Fi network. ● Cybercriminals can hack home routers and gain access to various internet-connected devices like home security systems and smart doorbells. ● Make sure your home Wi-Fi system has a hard-to-crack password and consider cybersecurity software that identifies “intruders” on your network. ● Finally, a VPN is one of the best ways to ensure your internet connection is secure.
  • 57. Tip #14: Monitor online activities ● Monitoring your kids offline is enough stress. ● Thankfully, there’s some cybersecurity tools to help you monitor their online activities. ● Install a cybersecurity software with parental controls on your kids' devices to block certain features on games, track kids' location, backup their data, and manage their screen time.
  • 58. Tip #15: Install a comprehensive cybersecurity suite ● To help every family member from clicking on the wrong links and visiting the wrong sites, install a comprehensive cyber safety solution that provides protection for all your family members and their devices. ● Your smartphone and tablet need as much protection as your computer and laptops. ● So do your thermostat, smart doorbell, home security system, and other internet-connected devices.
  • 59. Tip #16: When in doubt, call support ● The best security software programmes offer 24x7 support. ● If you have any suspicion you’ve been hacked, call for help. ● If you think your device is under malware, spyware, or ransomware attack, call for help. ● A good security suite will have experts to help you resolve your problem.
  • 60. Cyber Safety for Whole Family Yellow Pond
  • 61. Internet safety tips for the whole family ● It takes a whole family to make a home more cyber safe. ● The internet safety tips apply to everyone under roof.
  • 62. Tip #17: Be careful what you download ● There are more than 1.8 billion websites worldwide, and it's no secret that some of them have malicious intent. ● A malicious website is a site that attempts to install malware on your device, meaning anything that will disrupt computer operation, gather your personal information, or allow unauthorized access to your machine. ● This usually requires some action on your part, but there are also drive-by downloads, whereby a website will attempt to install software on your computer without asking for permission first. ● Downloading and running security software can help defend against these threats, but it's also worth knowing how to diagnose if your computer has malware so you can remove malware.
  • 63. Tip #18: Go private on public Wi-Fi ● There are a lot of risks of connecting to public Wi-Fi networks. ● In addition to keeping your kids and teens attuned to them, it’s important for parents to remind themselves that hackers and cybercriminals consider public Wi- Fi, such as in malls and coffee shops, an easy access point to getting hold of your data. ● For this reason, always use a VPN when connecting to public Wi-Fi. ● Don’t have a VPN? Consider if you can hold off on internet browsing until you are home.
  • 64. Tip #19: Close unused accounts ● Unused accounts can be a rich source of personal information for cybercriminals. Sometimes kids create an account with their first and last name or their birthday in the username. ● Cybercriminals can patch these data points together and steal information from other sites that the individual uses. ● If you think you won’t be revisiting the site, it’s best to close the account.
  • 65. Tip #20: Spend time online together ● A good way to keep your home more cyber safe? ● Hold all of the family members accountable for their internet safety practices and support one another when someone faces a precarious online situation. ● As parents, that means monitoring your kids’ behaviors but also showing an interest in the sites they’re visiting and games they’re playing so that you can educate them on whether they’re safe. ● Keep things transparent by keeping desktop computers in a common area and discouraging kids from playing with tablets just in their rooms. ● Bonus tip: Spend time online together by having an online family game night.
  • 67. Reference 1. Norton (Jan. 25, 2021). Kids safety. https://us.norton.com/internetsecurity-kids-safety-stop-stressing-10-internet- safety-rules-to-help-keep-your-family-safe-online.html 2. https://www.virtuallibrary.info/cybersafety.html 3. https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security 4. https://www.jigsawacademy.com/blogs/cyber-security/cyber-safety 5. https://usa.kaspersky.com/resource-center/preemptive-safety/top-10-internet-safety-rules-and-what-not-to-do-online Yellow Pond