SlideShare a Scribd company logo
INTERNET
SAFETY
TOOLS OF INTERNET
World Wide Web (WWW): This is the part of the internet
that most people are most familiar with. It's the system of
interconnected documents and other resources that can be
accessed via a web browser.
Domain: A domain is the part of a web address that identifies
a particular website. For example, in the web address
"www.example.com", "example.com" is the domain
• IP address: An IP address is a numerical label Router: A
router is a device that connects computer networks together
and allows data to be transmitted between them. It routes
data packets between devices on a network.each device
connected to a computer network that uses the Internet
Protocol for communication. An IP address serves two main
functions: it identifies the host or device, and it provides the
location of the host in the network.
• Server: A server is a computer that provides services to other
computers or devices. For example, a web server is a
computer that stores and serves web pages to users.
• Router: A router is a device that connects computer
networks together and allows data to be transmitted
between them. It routes data packets between devices on a
network.
• Use strong and unique passwords: Use a combination
of letters, numbers, and special characters in your
passwords and make sure to use different passwords
for different accounts.
• Enable two-factor authentication: This adds an extra
layer of security to your accounts by requiring you to
enter a code sent to your phone or email in addition to
your password.
• Be Careful Who You Meet Online-People you meet
online are not always who they claim to be. Indeed,
they may not even be real. As InfoWorld reports, fake
social media profiles are a popular way for hackers to
cozy up to unwary Web users and pick their cyber
• Keep Personal Information Professional and Limited-
Potential employers or customers don't need to know your
personal relationship status or your home address. They do
need to know about your expertise and professional
background, and how to get in touch with you. You wouldn't
hand purely personal information out to strangers
individually—don't hand it out to millions of people online.
• . Keep Your Privacy Settings On-Marketers love to know all
about you, and so do hackers. Both can learn a lot from your
browsing and social media usage. But you can take charge of
your information. As noted by Lifehacker, both web browsers
and mobile operating systems have settings available to
protect your privacy online. Major websites like Facebook
also have privacy-enhancing settings available.
• Be cautious of phishing attacks: Be wary of emails or website
that ask for personal information or login credentials. If you're
unsure about the legitimacy of an email or website, do some
research or contact the company directly.
• Install anti-virus software: This can help protect your
computer from malware and viruses that can steal your
personal information or damage your system.
• Be mindful of what you share online: Think twice before
posting personal information or photos online, and be
cautious about accepting friend requests from strangers
• Make Sure Your Internet Connection is Secure.- Use a
Secure VPN Connectionimprove your Internet browsing
safety, use secure VPN connection (virtual private network ).
VPN enables you to have a secure connection between your
device and an Internet server that no one can monitor or
access the data that you’re exchanging.
• Make Online Purchases From Secure Sites-Any time you
make a purchase online, you need to provide credit card or
bank account information—just what cybercriminals are
most eager to get their hands on. Only supply this
information to sites that provide secure, encrypted
connections.
TYPES OF INTERNET ISSUES
•Malware-
• Malware is one of the types of attacks that need maximum defense by a
Cyber Safety system. Typically, malware enters your system/ network
and denies access to the critical components of the network. There are
various types of it such as-
• Viruses-A virus usually comes as an attachment in an email that holds a
virus payload, or the part of the malware that performs the malicious
action. Once the victim opens the file, the device is infected.
• Spyware-Spyware is a program installed on your computer, usually
without your explicit knowledge, that captures and transmits personal
information or Internet browsing habits and details to its user.
•PHISING-
• Phising attacks are the practice of sending fraudulent
communications that appear to come from a reputable
source. It is usually done through email. The goal is to steal
sensitive data like credit card and login information, or to
install malware on the victim’s machine. Phishing is a
common type of cyber attack that everyone should learn
about in order to protect themselves.Phishing starts with a
fraudulent email or other communication that is designed
to lure a victim. The message is made to look as though it
comes from a trusted sender. If it fools the victim, he or she
is coaxed into providing confidential information, often on a
scam website.
CYBER SECURITY
A cyber security threat refers to any possible malicious attack
that seeks to unlawfully access data, disrupt digital operations
or damage information. Cyber threats can originate from
various actors, including corporate spies, hacktivists, terrorist
groups, hostile nation-states, criminal organizations, lone
hackers and disgruntled employees.
CYBER BULLYING
Cyberbullying is the act of using the internet to harm someone. There are
various forms of cyberbullying.
Flaming – This type of cyberbullying involves online fights with angry and vulgar
messages.
Harassment – Online harassment can take the form of insulting, mean, and
derogatory messages online.
Denigration – Denigration is when someone posts rumors or gossip about
someone online, with the purpose of damaging their reputation.
Impersonation – Impersonation means pretending to be someone else to get
them in trouble.
Outing – Outing is when someone shares somebody else’s secrets, images or
information online.
Trickery – When people trick someone into revealing things and then post them
online, it’s called Trickery.
Exclusion – Exclusion is when an individual or a group of people intentionally
keeps someone out of an online group.
Cyberstalking – Cyberstalking is usually done to create fear in an individual using
repeated harassment and denigration.
CYBER BULLYING PREVENTION TIPS FOR
STUDENTS
• TALK ABOUT IT.- If you’re the target of cyberbullying.
Whether it’s your parents, a teacher, or another trusted
adult, or even your best friend, never keep to yourself the
fact that you’re being bullied.
• IGNORE THEM- If there is an isolated incident where you
are being bullied, don’t respond to the instigator. Those
who cyberbully but who do not get a response from their
target may just move on.
• NEVER RETALIATE- Be the bigger person and never retaliate
against someone who is mean to you. Retaliation only
further perpetuates the cycle of violence, and does nothing
to solve the problem.
• SAVE THE EVIDENCE-. Record all instances of cyberbullying.
Print out social media posts and emails, save texts, and
capture screen shots when cyberbullying occurs. You can
even make screen recordings of Snapchat, Facebook, or
Instagram Stories.
• REPORT IT TO THE CONTENT PROVIDER.- If don’t know
who is cyberbullying you, contact the provider of the site or
platform where the cyberbullying is occurring and make a
report.
SAFE DIGITAL BANKING
INTERNET SAFETY-WPS Office (1).pptx

More Related Content

Similar to INTERNET SAFETY-WPS Office (1).pptx

Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
Bobby Dait
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber Awareness
ShwetaSingh713663
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
RavinderSingh172970
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
ShubhamGupta833557
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Kaushal Solanki
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
Syed Rizwan Ali
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
CGC Technical campus,Mohali
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
NoelBuctot1
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
NetLockSmith
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
karanjohar
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
MILANOP1
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
BarakaMuyengi
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
bcanawakadalcollege
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
Aarush59
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 

Similar to INTERNET SAFETY-WPS Office (1).pptx (20)

Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber Awareness
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

Recently uploaded

HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
ClarissaAlanoCredito
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
ClarissaAlanoCredito
 
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
AJHSSR Journal
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
zeqirielmedina8
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
lorraineandreiamcidl
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
SocioCosmos
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
digitalcourseshop4
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
SocioCosmos
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
grogshiregames
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
ryxqoswi
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
Digital Marketing Lab
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
Virtual Real Design
 
Transform Your Presence Now!..............
Transform Your Presence Now!..............Transform Your Presence Now!..............
Transform Your Presence Now!..............
SocioCosmos
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
SocioCosmos
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
SocioCosmos
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
grogshiregames
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
SocioCosmos
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
Febless Hernane
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
AJHSSR Journal
 

Recently uploaded (19)

HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
 
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
 
Transform Your Presence Now!..............
Transform Your Presence Now!..............Transform Your Presence Now!..............
Transform Your Presence Now!..............
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
 

INTERNET SAFETY-WPS Office (1).pptx

  • 2. TOOLS OF INTERNET World Wide Web (WWW): This is the part of the internet that most people are most familiar with. It's the system of interconnected documents and other resources that can be accessed via a web browser. Domain: A domain is the part of a web address that identifies a particular website. For example, in the web address "www.example.com", "example.com" is the domain
  • 3. • IP address: An IP address is a numerical label Router: A router is a device that connects computer networks together and allows data to be transmitted between them. It routes data packets between devices on a network.each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: it identifies the host or device, and it provides the location of the host in the network. • Server: A server is a computer that provides services to other computers or devices. For example, a web server is a computer that stores and serves web pages to users. • Router: A router is a device that connects computer networks together and allows data to be transmitted between them. It routes data packets between devices on a network.
  • 4. • Use strong and unique passwords: Use a combination of letters, numbers, and special characters in your passwords and make sure to use different passwords for different accounts. • Enable two-factor authentication: This adds an extra layer of security to your accounts by requiring you to enter a code sent to your phone or email in addition to your password. • Be Careful Who You Meet Online-People you meet online are not always who they claim to be. Indeed, they may not even be real. As InfoWorld reports, fake social media profiles are a popular way for hackers to cozy up to unwary Web users and pick their cyber
  • 5. • Keep Personal Information Professional and Limited- Potential employers or customers don't need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn't hand purely personal information out to strangers individually—don't hand it out to millions of people online. • . Keep Your Privacy Settings On-Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing and social media usage. But you can take charge of your information. As noted by Lifehacker, both web browsers and mobile operating systems have settings available to protect your privacy online. Major websites like Facebook also have privacy-enhancing settings available.
  • 6. • Be cautious of phishing attacks: Be wary of emails or website that ask for personal information or login credentials. If you're unsure about the legitimacy of an email or website, do some research or contact the company directly. • Install anti-virus software: This can help protect your computer from malware and viruses that can steal your personal information or damage your system. • Be mindful of what you share online: Think twice before posting personal information or photos online, and be cautious about accepting friend requests from strangers
  • 7. • Make Sure Your Internet Connection is Secure.- Use a Secure VPN Connectionimprove your Internet browsing safety, use secure VPN connection (virtual private network ). VPN enables you to have a secure connection between your device and an Internet server that no one can monitor or access the data that you’re exchanging. • Make Online Purchases From Secure Sites-Any time you make a purchase online, you need to provide credit card or bank account information—just what cybercriminals are most eager to get their hands on. Only supply this information to sites that provide secure, encrypted connections.
  • 8. TYPES OF INTERNET ISSUES •Malware- • Malware is one of the types of attacks that need maximum defense by a Cyber Safety system. Typically, malware enters your system/ network and denies access to the critical components of the network. There are various types of it such as- • Viruses-A virus usually comes as an attachment in an email that holds a virus payload, or the part of the malware that performs the malicious action. Once the victim opens the file, the device is infected. • Spyware-Spyware is a program installed on your computer, usually without your explicit knowledge, that captures and transmits personal information or Internet browsing habits and details to its user.
  • 9. •PHISING- • Phising attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim’s machine. Phishing is a common type of cyber attack that everyone should learn about in order to protect themselves.Phishing starts with a fraudulent email or other communication that is designed to lure a victim. The message is made to look as though it comes from a trusted sender. If it fools the victim, he or she is coaxed into providing confidential information, often on a scam website.
  • 10. CYBER SECURITY A cyber security threat refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations or damage information. Cyber threats can originate from various actors, including corporate spies, hacktivists, terrorist groups, hostile nation-states, criminal organizations, lone hackers and disgruntled employees.
  • 11. CYBER BULLYING Cyberbullying is the act of using the internet to harm someone. There are various forms of cyberbullying. Flaming – This type of cyberbullying involves online fights with angry and vulgar messages. Harassment – Online harassment can take the form of insulting, mean, and derogatory messages online. Denigration – Denigration is when someone posts rumors or gossip about someone online, with the purpose of damaging their reputation. Impersonation – Impersonation means pretending to be someone else to get them in trouble. Outing – Outing is when someone shares somebody else’s secrets, images or information online. Trickery – When people trick someone into revealing things and then post them online, it’s called Trickery. Exclusion – Exclusion is when an individual or a group of people intentionally keeps someone out of an online group. Cyberstalking – Cyberstalking is usually done to create fear in an individual using repeated harassment and denigration.
  • 12. CYBER BULLYING PREVENTION TIPS FOR STUDENTS • TALK ABOUT IT.- If you’re the target of cyberbullying. Whether it’s your parents, a teacher, or another trusted adult, or even your best friend, never keep to yourself the fact that you’re being bullied. • IGNORE THEM- If there is an isolated incident where you are being bullied, don’t respond to the instigator. Those who cyberbully but who do not get a response from their target may just move on.
  • 13. • NEVER RETALIATE- Be the bigger person and never retaliate against someone who is mean to you. Retaliation only further perpetuates the cycle of violence, and does nothing to solve the problem. • SAVE THE EVIDENCE-. Record all instances of cyberbullying. Print out social media posts and emails, save texts, and capture screen shots when cyberbullying occurs. You can even make screen recordings of Snapchat, Facebook, or Instagram Stories. • REPORT IT TO THE CONTENT PROVIDER.- If don’t know who is cyberbullying you, contact the provider of the site or platform where the cyberbullying is occurring and make a report.