INTERNET
SAFETY
CYBER BULLYING
 Cyberbullying is bullying that takes place over digital
devices like cell phones, computers, and tablets.
Cyberbullying can occur through SMS, Text, and apps, or
online in social media, forums, or gaming where people can
view, participate in, or share content. Cyberbullying includes
sending, posting, or sharing negative, harmful, false, or
mean content about someone else. It can include sharing
personal or private information about someone else causing
embarrassment or humiliation. Some cyberbullying crosses
the line into unlawful or criminal behavior.
CYBER BULLYING
 The most common places where cyberbullying occurs are:
 Social Media, such as Facebook, Instagram, Snapchat, and Twitter
 SMS (Short Message Service) also known as Text Message sent
through devices
 Instant Message (via devices, email provider services, apps, and
social media messaging features)
 Email
CYBER STALKING
 Cyberstalking is a crime in which the attacker harasses a
victim using electronic communication, such as e-mail or
instant messaging (IM), or messages posted to a Web site
or a discussion group. A cyberstalker relies upon the
anonymity afforded by the Internet to allow them to stalk
their victim without being detected. Cyberstalking messages
differ from ordinary spam in that a cyberstalker targets a
specific victim with often threatening messages, while the
spammer targets a multitude of recipients with simply
annoying messages.
SEXTORTION
 Sextortion, especially via the use of webcams, is a concern, especially for those
who use webcams for flirting and cybersex.[10][11] Often this involves a
cybercriminal posing as someone else - such as an attractive person - initiating
communication of a sexual nature with the victim. The victim is then persuaded
to undress in front of a webcam, and may also be persuaded to engage in
sexual behaviour, such as masturbation.[12] The video is recorded by the
cybercriminal, who then reveals their true intent and demands money or other
services (such as more explicit images of the victim, in cases of online predation),
threatening to publicly release the video and send it to family members and
friends of the victim if they do not comply.[12] A video highlighting the dangers of
sextortion has been released by the National Crime Agency[13] in the UK to
educate people, especially given the fact that blackmail of a sexual nature may
cause humiliation to a sufficient extent to cause the victim to take their own
life,[11] in addition to other efforts to educate the public on the risks of
sextortion.[10]
PERSONAL SAFETY
 The growth of the internet gave rise to many important services
accessible to anyone with a connection. One of these important services
is digital communication. While this service allowed us to communicate
with others through the internet, this also allowed the communication
with malicious users. While malicious users often use the internet for
personal gain, this may not be limited to financial/material gain. This is
especially a concern to parents and children, as children are often
targets of these malicious users. Common threats to personal safety
include: phishing, internet scams, malware, cyberstalking, cyberbullying,
online preditions and sextortion
STAY SAFE
THE END

Riza 9 a

  • 1.
  • 2.
    CYBER BULLYING  Cyberbullyingis bullying that takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.
  • 3.
    CYBER BULLYING  Themost common places where cyberbullying occurs are:  Social Media, such as Facebook, Instagram, Snapchat, and Twitter  SMS (Short Message Service) also known as Text Message sent through devices  Instant Message (via devices, email provider services, apps, and social media messaging features)  Email
  • 4.
    CYBER STALKING  Cyberstalkingis a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group. A cyberstalker relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected. Cyberstalking messages differ from ordinary spam in that a cyberstalker targets a specific victim with often threatening messages, while the spammer targets a multitude of recipients with simply annoying messages.
  • 5.
    SEXTORTION  Sextortion, especiallyvia the use of webcams, is a concern, especially for those who use webcams for flirting and cybersex.[10][11] Often this involves a cybercriminal posing as someone else - such as an attractive person - initiating communication of a sexual nature with the victim. The victim is then persuaded to undress in front of a webcam, and may also be persuaded to engage in sexual behaviour, such as masturbation.[12] The video is recorded by the cybercriminal, who then reveals their true intent and demands money or other services (such as more explicit images of the victim, in cases of online predation), threatening to publicly release the video and send it to family members and friends of the victim if they do not comply.[12] A video highlighting the dangers of sextortion has been released by the National Crime Agency[13] in the UK to educate people, especially given the fact that blackmail of a sexual nature may cause humiliation to a sufficient extent to cause the victim to take their own life,[11] in addition to other efforts to educate the public on the risks of sextortion.[10]
  • 6.
    PERSONAL SAFETY  Thegrowth of the internet gave rise to many important services accessible to anyone with a connection. One of these important services is digital communication. While this service allowed us to communicate with others through the internet, this also allowed the communication with malicious users. While malicious users often use the internet for personal gain, this may not be limited to financial/material gain. This is especially a concern to parents and children, as children are often targets of these malicious users. Common threats to personal safety include: phishing, internet scams, malware, cyberstalking, cyberbullying, online preditions and sextortion
  • 7.