4. Create Complex Passwords.
Boost Your Network Security.
Use a Firewall.
Practice Safe Surfing & Shopping.
Lookout for the latest scams.
Be a Selective Sharer.
Click Smart.
Keep up to date.
Keep your guard up.
5.
6. A social networking service
(also social networking site, SNS
or social media) is an online
platform which people use to
build social
networks or social relations with
other people who share similar
personal or career interests,
7. Don’t post your phone numbers.
Don’t post your address.
Avoid status update with place
and time reference.
Set all your privacy settings to
“Friends Only” .
Don’t accept friend request of
strangers .
8.
9.
10. A computer hacker is any skilled
computer expert that uses their technical
knowledge to overcome a problem.
While "hacker" can refer to any skilled
computer programmer, the term has
become associated in popular
culture with a "security hacker",
someone who, with their technical
knowledge, uses bugs or exploits to
break into computer systems.
11.
12. Cyber bullying or cyber harassment is
a form
of bullying or harassment using
electronic means.
It has become increasingly common,
especially among teenagers.
Cyber bullying is when someone,
typically teens, bully or harass others on
social media sites.
Cyber bullying allows bullies to easily
and anonymously harass victims online.
13.
14.
15. Cyber stalking is a form of online
harassment in which the perpetrator
uses electronic communications
to stalk a victim.
This is considered more dangerous
than other forms of cyber bullying
because it generally involves a
credible threat to the victim's safety.
It may also include monitoring, identity
theft, threats, or gathering
information that may be used to threaten,
16.
17. Any malicious programs on a computer or
mobile device, such as a virus, worm,
Trojan horse, spyware, etc. collectively
called Malware.
These programs are installed without the
consent of users and can cause a number
of unpleasant effects, such as crippling
computer performance, mining your
system for personal data, erasing data or
even adversely affecting the operation of
18.
19. Cyber Safety : -
It is the safe and responsible use of
information and communication
technology. It is about keeping
information safe and secure, but also
about being responsible with that
information, being respectful of other
people online, and using good
'netiquette' (internet etiquette).
20. Be suspicious of any email with urgent
requests for personal financial
information.
Always ensure that you're using a
secure website when submitting credit
card or other sensitive information via
your Web browser.
Check the beginning of the Web
address in your browsers address bar
It should begin with "https://" rather
than just "http://".