2. The guessing Game
ā¢Try to guess the percentage of the following
statistic:
1. Teenagers who have a social networking
account.
2. Teenagers who regularly get messages from
strangers.
3. Teens who post photos and videos of
themselves.
3. 4. Female teens who post personal photos and
videos of themselves.
5. Male teens who post personal videos and
photos of themselves.
6. Teens who posted their cell phone number
online.
4. Social Network
71%
29%
TEENS
Have A Social Network Profile Don't Have
Did you know that FaceBook and
most social networking sites only
allow users aged 13 and above?
5. Teen MEssaging
Regularly gets
messages from
strangers
69%
Doesn't get
regularly
31%
Messaging
Regularly gets messages from
strangers
Doesn't get regularly
Nearly half of teens (47%)
are not worried about
others using their personal
info in ways they do not
want
6. The ugly truth
ā¢ Percent of teenagers who have sent or posted nude or semi-nude
pictures or videos of themselves:
ā¢ 20% overall
ā¢ 22% teen girls
ā¢ 18% teen boys
ā¢ 11% young teen girls ages 13-16
ā¢ Percent of teenagers sending or posting sexually suggestive
messages:
ā¢ 39% overall
ā¢ 37% teen girls
ā¢ 40% teen boys
7. ā¢ 51 Percent of teen girls say pressure from a guy is a reason girls send
sexy messages or images; only 18 % of teen boys cited pressure from
female counterparts as a reason.
ā¢ 66 Percent of teen girls and 60% of teen boys say they did so to be āfun
or flirtatiousā; their most common reason for sending sexy content.
ā¢ 17 Percent of the sexting recipients report that they have passed the
images along to someone else.
ā¢ 14 Percent of young people who have shared a naked photo or video of
themselves suspect that the recipient probably shared the image with
someone else without permission.
8. The internet is as secure as an armor
made of tissue.
ā¢ The 2014 Celebrity Photo Hack
ā¢ On August 31, 2014 a collection of almost 500 private pictures of
various celebrities, mostly women, and with many containing nudity
were posted on the imageboard 4chan and later disseminated on
other websites.
ā¢ The images were believed to have been obtained via a breach of
Appleās cloud services suite iCloud
One of the victims was underage at the time the photos were
taken.
10. Tips to Stay Safe Online
ļ± Donāt post any personal
information online ā like your
address, email address or mobile
number.
11. ļ± Think carefully before posting pictures
or videos of yourself.
ļ± Keep your privacy as high as possible.
ļ± Never give out your passwords.
ļ± Donāt befriend people you donāt know.
12. ļ± Donāt meet up with people youāve met
online.
ļ± Remember that not everyone online
is who they say they are.
ļ± Think carefully about what you say
before you post something online.
13. ļ± Respect other peopleās views, even if
you donāt agree with someone elseās
views
doesnāt mean you need to be rude.
ļ± If you see something online that makes
you feel uncomfortable , turn off your
computer if you want to and tell a
trusted adult immediately
15. Malware
ļ± Malware is short for malicious
software, is any software used to
disrupt computer operation, gather
sensitive information, or gain access to
private computer system.
16. VIRUS
ļ± A piece of code that is capable of copying itself
and typically has a detrimental effect, such as
corrupting the system or destroying data.
ļ± The common use of a virus is to take over a
computer to steal data.
17. WORMS
ļ± Worms are programs that can replicate
themselves through computer network and
performs malicious tasks.
ļ± Example of this kind of virus is ILOVEYOU
virus made by a Filipino.
18.
19.
20. TROJAN HORSE
ļ± A malicious software that pretends to
be harmless, so that a user willingly
allows it to be downloaded onto the
computer.
21. SPYWARE
ļ± Refers to a programs that
superstitiously monitor activity on a
computer system and report that
information to others without the userās
consent.
28. This level is still accessible
through normal means, but
contains ādarkerā websites, such
as Reddit.
29. Reddit is an American social news aggregation, web
content rating, and discussion website. Registered
members submit content to the site such as links, text
posts, and images, which are then voted up or down by
other members. Posts are organized by subject into user-
created boards called "subreddits", which cover a variety
of topics including news, science, movies, video games,
music, books, fitness, food, and image-sharing.
30. This level is still accessible
through normal means, but
contains ādarkerā websites, such
as Reddit.
31.
32. This level is still accessible
through normal means, but
contains ādarkerā websites, such
as Reddit.
33. Level 2 ā Bergie Web
This level is the last one normally accessible:
all levels that follow this one have to be
accessed with a proxy, Tor or by modifying
your hardware. In this level you can find
some āundergroundā but still indexed
websites, such as 4chan.
34. 4chan is an English-language imageboard website. Users generally
post anonymously, with the most recent posts appearing above the
rest. 4chan is split into various boards with their own specific
content and guidelines. Registration is not possible (except for staff).
Launched on October 1, 2003, the site was modeled on Japanese
imageboards, particularly Futaba Channel. 4chan's first boards were
originally primarily used for posting pictures and discussing manga
and anime. The site quickly became popular, expanded, and now
features boards dedicated to a wide variety of topics, from
anime/manga to videogames, music, literature, fitness, politics, and
sports.
35.
36. Level 3 ā Deep Web
The first part of this level has to be
accessed with a proxy. It contains
CP, gore, hacking websitesā¦ Here
begins the Deep Web. Second part
of this level is only accessible
through Tor, and contains more
sensible information.
52. MONEY THEFT
ļ± In many cases, they are āinside jobā that
involve fraudulent alteration of
computer databases to cover the tracks
of the employees involved.
53. Service Theft
ļ± The unauthorized copy of systems and
networks is called service theft. A common
example is unauthorized use of company-
owned computer networks by employees.
55. DATA ALTERATION
ļ± Making illegal changes or stealing data is
another form of computer crime.
ļ± Example of is taking payments from students
and using the universityās computer system to
change their grades in return
56.
57. DESTRUCTION OF DATA AND
SOFTWARE
ļ± One of the most destructive examples of
computer crimes involves the creation of
computer viruses or worms.