SlideShare a Scribd company logo
Cyber Safety
We all have been acquainted with one of the
greatest inventions of mankind, the Internet.
The Internet is an astounding place.
It contains information about every topic the human brain can
fathom.
The amount of data it holds is leagues beyond the imagination of the
mind.
BUT
• 20% of kids cyberbullied think
about suicide, and 1 in 10 attempt
it.
• 42% of teenagers with tech access
report being cyberbullied over the
past year
• Over 25 percent of adolescents
and teens have been bullied
repeatedly through their cell
phones or the Internet.
What is cyber bullying?
• Sending mean messages or threats to a person's email
account or cell phone.
• Spreading rumours online or through texts.
• Posting hurtful or threatening messages on social
networking sites or web pages.
• Stealing a person's account information to break into
their account and send damaging messages.
• Pretending to be someone else online to hurt
another person.
• Taking unflattering pictures of a person and spreading
them through cell phones or the Internet.
As the quote goes, “Prevention is better
than cure” so we will as well make an
attempt to go cybersafe so that we don’t
end up opening the ‘Pandora’s Box of the
digital world’.
It’s time we
bridge the
digital divide.
What could be done?
• Be kind to others and use netiquette (no
flooding, be nice to newbies, avoid using all
caps, and set a good tone).
• Don’t give out personal information online like
PIN, passwords, home address, cell number
• Be strong and stop it early. Don’t stoop to their
level and lash back. Don’t suffer in silence.
• Contact your Internet service provider abuse
department. If the problem continues, alert
the local police department.
• If anything makes you feel uncomfortable
online, while gaming or when using your cell
phone, talk with your parents or guardian
right away.
Safety on
Social Media
• Avoid exchanging pictures or giving out e-
mail addresses and personal information to
people you meet online.
• Never post your personal information, such
as a cell phone number, home number, home
address, or your location on any social
networking site or through mobile apps like
Snapchat or Instagram.
• Don’t always trust your newfound online friends.
Remember, the predator waits patiently.
• Make passwords long and strong. Use a combination
of lower and uppercase letters along with symbols.
• Links in email, tweets, posts, and online advertising
are often the way cybercriminals compromise your
computer. If it looks suspicious, even if you know the
source, it’s best to delete or if appropriate, mark as
junk email.
The Internet has eased out our
lives remarkably but at the same
time, has also opened a few doors
to malice.
So, it’s our duty to keep those
doors locked

More Related Content

What's hot

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
Queens Library
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullyingbolan1jt
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Cyber safety
Cyber safetyCyber safety
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
MsCCostello
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpointshannonmf
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
Maria Petropulos
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
Avanzo net
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 

What's hot (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Power Point Cyber-bullying
Power Point Cyber-bullyingPower Point Cyber-bullying
Power Point Cyber-bullying
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Viewers also liked

Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
Vinay Soni
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
Fersie Ann Malacas
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
360 businessoverview
360 businessoverview360 businessoverview
360 businessoverviewSmartlife360
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
Rajesh Soundararajan
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
jaimejoyh
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
Matt Britland
 
Principles of manual handling
Principles of manual handlingPrinciples of manual handling
Principles of manual handling
Dan Cullen BscHonsEd M.Sec.I.I., MCSA
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Manual Handling Ppt
Manual Handling PptManual Handling Ppt
Manual Handling Pptvtsiri
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpointmyra14
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
Natasha Murashev
 

Viewers also liked (14)

Cyber saftey
Cyber safteyCyber saftey
Cyber saftey
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
360 businessoverview
360 businessoverview360 businessoverview
360 businessoverview
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Principles of manual handling
Principles of manual handlingPrinciples of manual handling
Principles of manual handling
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Manual Handling Ppt
Manual Handling PptManual Handling Ppt
Manual Handling Ppt
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similar to Cyber Safety

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
EVILEDITOR
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Yash Jain
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
renumann
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
Sanil Shrivastava
 
cybersecurity and Bullying
cybersecurity and Bullying cybersecurity and Bullying
cybersecurity and Bullying
Karthik Kumar
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
CharanBobby69CB
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
R Smith
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
Daniel Hanttula
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
KanelandSvihlik
 
My protection plan
My protection planMy protection plan
My protection plan
Shakena12
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
jun ijan
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 

Similar to Cyber Safety (20)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
cybersecurity and Bullying
cybersecurity and Bullying cybersecurity and Bullying
cybersecurity and Bullying
 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
My protection plan
My protection planMy protection plan
My protection plan
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

Recently uploaded

国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 

Recently uploaded (20)

国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 

Cyber Safety

  • 2.
  • 3. We all have been acquainted with one of the greatest inventions of mankind, the Internet. The Internet is an astounding place. It contains information about every topic the human brain can fathom. The amount of data it holds is leagues beyond the imagination of the mind.
  • 4. BUT
  • 5.
  • 6. • 20% of kids cyberbullied think about suicide, and 1 in 10 attempt it. • 42% of teenagers with tech access report being cyberbullied over the past year • Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet.
  • 7. What is cyber bullying? • Sending mean messages or threats to a person's email account or cell phone. • Spreading rumours online or through texts. • Posting hurtful or threatening messages on social networking sites or web pages. • Stealing a person's account information to break into their account and send damaging messages. • Pretending to be someone else online to hurt another person. • Taking unflattering pictures of a person and spreading them through cell phones or the Internet.
  • 8.
  • 9. As the quote goes, “Prevention is better than cure” so we will as well make an attempt to go cybersafe so that we don’t end up opening the ‘Pandora’s Box of the digital world’.
  • 10. It’s time we bridge the digital divide.
  • 11.
  • 12. What could be done? • Be kind to others and use netiquette (no flooding, be nice to newbies, avoid using all caps, and set a good tone). • Don’t give out personal information online like PIN, passwords, home address, cell number • Be strong and stop it early. Don’t stoop to their level and lash back. Don’t suffer in silence.
  • 13.
  • 14. • Contact your Internet service provider abuse department. If the problem continues, alert the local police department. • If anything makes you feel uncomfortable online, while gaming or when using your cell phone, talk with your parents or guardian right away.
  • 15.
  • 16.
  • 18.
  • 19. • Avoid exchanging pictures or giving out e- mail addresses and personal information to people you meet online. • Never post your personal information, such as a cell phone number, home number, home address, or your location on any social networking site or through mobile apps like Snapchat or Instagram.
  • 20. • Don’t always trust your newfound online friends. Remember, the predator waits patiently. • Make passwords long and strong. Use a combination of lower and uppercase letters along with symbols. • Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.
  • 21.
  • 22.
  • 23.
  • 24. The Internet has eased out our lives remarkably but at the same time, has also opened a few doors to malice. So, it’s our duty to keep those doors locked