SlideShare a Scribd company logo
Cyber Safety
Welcome to
CYBERSPACE
POPPULATION: 1,700,000,000 AND GROWING
We all have been acquainted with one of the
greatest inventions of mankind, the Internet.
The Internet is an astounding place.
It contains information about every topic the human brain can
fathom.
The amount of data it holds is leagues beyond the imagination of the
mind.
BUT
10.4% 9.8%
ā€¢ 20% of kids cyberbullied think about suicide, and
1 in 10 attempt it.
ā€¢ 42% of teenagers with tech access report being
cyberbullied over the past year.
ā€¢ Over 25 percent of adolescents and teens have
been bullied repeatedly through their cell phones
or the internet.
What is cyber bullying?
ā€¢ Sending mean messages or threats to a personā€™s email account or
cell phone.
ā€¢ Spreading rumours online or through texts.
ā€¢ Posting hurtful or threatening messages on social networking
sites or web pages.
ā€¢ Stealing a personā€™s account information to break into their
account and send damaging messages.
ā€¢ Pretending to be someone else online to hurt another
person.
ā€¢ Taking unflattering pictures of a person and spreading them
through cell phones or the Internet
How a
Cyber-
bully hurts
Posts pictures
of you to hurt
or embarrass
Spreads lies
and rumors
about you
Pretends to
be you online
Dupes you
into revealing
personal
information
Sends
threatening
email or text
messages
As the quote goes, ā€œPrevention is better
than cureā€ so we will as well make an
attempt to go cybersafe so that we donā€™t
end up opening the ā€˜Pandoraā€™s Box of the
digital worldā€™.
Itā€™s time we bridge the
digital divide.
What could be done?
ā€¢ Be kind to others and use netiquette (no
flooding, be nice to newbies, avoid using all
caps, and set a good tone).
ā€¢ Donā€™t give out personal information online like
PIN, passwords, home address cell number
ā€¢ Be strong and stop it early. Donā€™t stoop to their level and lash back.
Donā€™t suffer in silence.
Keep your personal
stuff private and think
about what you say
and do online.
Block people who
send nasty messages
and donā€™t open
unknown links and
attachments.
Flag up with someone
you trust if anything
upsets you or if
someone asks to
meet you offline.
ā€¢Contact your Internet service provider abuse
department. If the problem continues, alert
the local police department.
ā€¢If anything makes you feel uncomfortable
online, while gaming or when using your cell
phone, talk with your parents or guardian
right away.
Cyberspace has a Dark Side
Please Turn a Light On!
ā€¢Avoid exchanging pictures or giving out e-
mail addresses and personal information to
people you meet online.
ā€¢Never post your personal information, such
as a cell phone number, home number, home
address, or your location on any social
networking site or through mobile apps like
Snapchat or Instagram.
ā€¢Donā€™t always trust your newfound online friends.
Remember, the predator waits patiently.
ā€¢Make password long and strong. Use a combination
of lower and uppercase letters along with symbols.
ā€¢Links in email, tweets, posts, and online advertising
our often the way cybercriminals compromise your
computer. If it looks suspicious even if you know the
source itā€™s best to delete or if appropriate mark as
junk email.
The internet has eased out our
lives remarkably but at the same
time, has also opened a few doors
to malice.
So itā€™s our duty to keep those
doors locked.
Cyber safety

More Related Content

What's hot

Internet safety
Internet safety Internet safety
Internet safety
bhavya mohindru
Ā 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents
lisluandaprimary
Ā 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
Christine Hui Jun Zhong
Ā 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
Khy Amigable
Ā 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Marc Kuhn
Ā 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
Ā 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
Ā 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
Ā 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
Ā 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
mcmullan
Ā 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
mcgeet
Ā 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
Ā 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
CoachElrod
Ā 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
Mary Alice Osborne
Ā 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
Ā 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Aayushi Singh
Ā 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
Ā 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
Ā 

What's hot (20)

Internet safety
Internet safety Internet safety
Internet safety
Ā 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents
Ā 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
Ā 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
Ā 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
Ā 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
Ā 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Ā 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
Ā 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
Ā 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Ā 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Ā 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
Ā 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Ā 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Ā 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Ā 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
Ā 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Ā 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Ā 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Ā 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Ā 

Viewers also liked

CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
Yogesh Prajapati
Ā 
Safety @ Cyber
Safety @ CyberSafety @ Cyber
Safety @ Cyber
Anirudh Anirudh
Ā 
Cyber safety
Cyber safetyCyber safety
Cyber safety
alyssacarricato
Ā 
Comp 107 cep 8
Comp 107 cep 8Comp 107 cep 8
Comp 107 cep 8Bala Ganesh
Ā 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
Matt Britland
Ā 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
lorrflores
Ā 
Cyber safety m harrold
Cyber safety m harroldCyber safety m harrold
Cyber safety m harroldMegan
Ā 
Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
Ā 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
Tawose Olamide Timothy
Ā 
Impact cyber safety revised
Impact cyber safety revisedImpact cyber safety revised
Impact cyber safety revisedlibraryreeder
Ā 
Cyber safety
Cyber safetyCyber safety
Cyber safety
reshmimohanan
Ā 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safetymarnett
Ā 
Safe Schools Program
Safe Schools ProgramSafe Schools Program
Safe Schools Program
seangraham40
Ā 
Cyber safety training for 6th grade
Cyber safety training for 6th gradeCyber safety training for 6th grade
Cyber safety training for 6th grade
Pamela Taylor
Ā 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
guest5c4bc9
Ā 
Cyber safety posters r9
Cyber safety posters r9Cyber safety posters r9
Cyber safety posters r9
Daniela L
Ā 
Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety
Mark Woolley
Ā 
Cyber Safety: Privacy Options in Social Media Platforms
Cyber Safety: Privacy Options in Social Media PlatformsCyber Safety: Privacy Options in Social Media Platforms
Cyber Safety: Privacy Options in Social Media PlatformsAditi Rao
Ā 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
Ā 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Karen Brooks
Ā 

Viewers also liked (20)

CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
Ā 
Safety @ Cyber
Safety @ CyberSafety @ Cyber
Safety @ Cyber
Ā 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Ā 
Comp 107 cep 8
Comp 107 cep 8Comp 107 cep 8
Comp 107 cep 8
Ā 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
Ā 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
Ā 
Cyber safety m harrold
Cyber safety m harroldCyber safety m harrold
Cyber safety m harrold
Ā 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Ā 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
Ā 
Impact cyber safety revised
Impact cyber safety revisedImpact cyber safety revised
Impact cyber safety revised
Ā 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Ā 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Ā 
Safe Schools Program
Safe Schools ProgramSafe Schools Program
Safe Schools Program
Ā 
Cyber safety training for 6th grade
Cyber safety training for 6th gradeCyber safety training for 6th grade
Cyber safety training for 6th grade
Ā 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Ā 
Cyber safety posters r9
Cyber safety posters r9Cyber safety posters r9
Cyber safety posters r9
Ā 
Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety Building Resilient Children Bullying, Harassment& Cyber Safety
Building Resilient Children Bullying, Harassment& Cyber Safety
Ā 
Cyber Safety: Privacy Options in Social Media Platforms
Cyber Safety: Privacy Options in Social Media PlatformsCyber Safety: Privacy Options in Social Media Platforms
Cyber Safety: Privacy Options in Social Media Platforms
Ā 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
Ā 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
Ā 

Similar to Cyber safety

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
EVILEDITOR
Ā 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
Ā 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
Daniel Hanttula
Ā 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
CharanBobby69CB
Ā 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
R Smith
Ā 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
R Smith
Ā 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
Inderjeet Singh
Ā 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
Ā 
Students I Safety
Students I SafetyStudents I Safety
Students I SafetyDesiree Caskey
Ā 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbulling
alsebastino
Ā 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
Ā 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
Sanil Shrivastava
Ā 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient information
smithmpa
Ā 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.katnaylan
Ā 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
katnaylan
Ā 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
Ā 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
Ā 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
Ā 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
renumann
Ā 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
SimonBalle
Ā 

Similar to Cyber safety (20)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Ā 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
Ā 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
Ā 
cyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdfcyberbullyingspec-170513174644.pdf
cyberbullyingspec-170513174644.pdf
Ā 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Ā 
Cyberbullyingspec
CyberbullyingspecCyberbullyingspec
Cyberbullyingspec
Ā 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
Ā 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
Ā 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
Ā 
FAQ's About Cyberbulling
FAQ's About CyberbullingFAQ's About Cyberbulling
FAQ's About Cyberbulling
Ā 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
Ā 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
Ā 
Statistics and salient information
Statistics and salient informationStatistics and salient information
Statistics and salient information
Ā 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
Ā 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
Ā 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
Ā 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
Ā 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
Ā 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
Ā 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
Ā 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
UiPathCommunity
Ā 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
Ā 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
Ā 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
Ā 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
Ā 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
Ā 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
Ā 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
Ā 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
Ā 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
Ā 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
Ā 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
Ā 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
Ā 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
Ā 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
Ā 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
Ā 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Ā 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Ā 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Ā 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ā 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Ā 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
Ā 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Ā 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Ā 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Ā 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Ā 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Ā 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Ā 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Ā 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Ā 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Ā 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Ā 

Cyber safety

  • 3. We all have been acquainted with one of the greatest inventions of mankind, the Internet. The Internet is an astounding place. It contains information about every topic the human brain can fathom. The amount of data it holds is leagues beyond the imagination of the mind.
  • 4. BUT
  • 6. ā€¢ 20% of kids cyberbullied think about suicide, and 1 in 10 attempt it. ā€¢ 42% of teenagers with tech access report being cyberbullied over the past year. ā€¢ Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the internet.
  • 7. What is cyber bullying? ā€¢ Sending mean messages or threats to a personā€™s email account or cell phone. ā€¢ Spreading rumours online or through texts. ā€¢ Posting hurtful or threatening messages on social networking sites or web pages. ā€¢ Stealing a personā€™s account information to break into their account and send damaging messages. ā€¢ Pretending to be someone else online to hurt another person. ā€¢ Taking unflattering pictures of a person and spreading them through cell phones or the Internet
  • 8. How a Cyber- bully hurts Posts pictures of you to hurt or embarrass Spreads lies and rumors about you Pretends to be you online Dupes you into revealing personal information Sends threatening email or text messages
  • 9. As the quote goes, ā€œPrevention is better than cureā€ so we will as well make an attempt to go cybersafe so that we donā€™t end up opening the ā€˜Pandoraā€™s Box of the digital worldā€™.
  • 10. Itā€™s time we bridge the digital divide.
  • 11.
  • 12. What could be done? ā€¢ Be kind to others and use netiquette (no flooding, be nice to newbies, avoid using all caps, and set a good tone). ā€¢ Donā€™t give out personal information online like PIN, passwords, home address cell number ā€¢ Be strong and stop it early. Donā€™t stoop to their level and lash back. Donā€™t suffer in silence.
  • 13. Keep your personal stuff private and think about what you say and do online. Block people who send nasty messages and donā€™t open unknown links and attachments. Flag up with someone you trust if anything upsets you or if someone asks to meet you offline.
  • 14. ā€¢Contact your Internet service provider abuse department. If the problem continues, alert the local police department. ā€¢If anything makes you feel uncomfortable online, while gaming or when using your cell phone, talk with your parents or guardian right away.
  • 15.
  • 16. Cyberspace has a Dark Side Please Turn a Light On!
  • 17.
  • 18.
  • 19. ā€¢Avoid exchanging pictures or giving out e- mail addresses and personal information to people you meet online. ā€¢Never post your personal information, such as a cell phone number, home number, home address, or your location on any social networking site or through mobile apps like Snapchat or Instagram.
  • 20. ā€¢Donā€™t always trust your newfound online friends. Remember, the predator waits patiently. ā€¢Make password long and strong. Use a combination of lower and uppercase letters along with symbols. ā€¢Links in email, tweets, posts, and online advertising our often the way cybercriminals compromise your computer. If it looks suspicious even if you know the source itā€™s best to delete or if appropriate mark as junk email.
  • 21.
  • 22.
  • 23.
  • 24. The internet has eased out our lives remarkably but at the same time, has also opened a few doors to malice. So itā€™s our duty to keep those doors locked.