SlideShare una empresa de Scribd logo
1 de 19
HELLO
EVERYONE!
I AM GOING TO PRESENT
A PPT PRESENTATION OF
CYBER SAFETY.
HOPE YOU WILL ENJOY!!
CYBER SAFETY
CYBERBULLING
 involves the use of electronic
devices
 supports deliberate, repeated,
and hostile behavior by an
individual or group
 its intent is to harm others.
What is Cyberbullying
 According to a survey done in 2007 by
the National Crime and Protection
Council:​
 43% of teens report that they have
experienced some form of cyberbullying
that year.
 The incidence of cyberbullying is higher
among females than males. More
than 50% of females age 15 to 16 years
of age reported at least one
cyberbullying incident.
Why do teens cyberbully?
 81% Because they think it is funny​
 64% Because they don’t like the
person​
 45% Because they view the victim as
a loser​
 47% Because they feel there are no
consequences for cyberbullying
 45% Because they don’t think they will
get caught​
 58% of students surveyed don’t think
 cyberbullying is a big deal​
Stop Cyber bullying
Rachael was stalked online by
anonymous bully. She died by suicide
on October 9, 2006.
Stop Cyber bullying
Ryan, a 13-year old, who died by
suicide as a result of bullying at school
and online.
Stop Cyber bullying
 A cruel online hoax by a neighbor led
to the suicide death of Megan.
What is a cyber-predator?
 A cyber-predator uses the internet to
hunt for victims to take advantage of
them in some way:
 Emotionally
 Sexually
 Psychologically
 Financially
A cyber-predator knows how to
manipulate people by creating trust and
friendships where none should exist.
What is a cyber-predator?
 77% of the target for online predators
are teens aged 14 and older.
 33% of teens received an aggressive
sexual solicitation online in the past
year.
 75% of children are willing to share
personal information online about
themselves and their family in
exchange for goods and services
What is Phishing
 Phishing is the act of requesting
confidential information over the
Internet under false pretenses in order
to fraudulently obtain credit card
numbers, passwords, or other
personal data.
Phishing
 15% of online teens have received a
fraudulent message, compared with
22% of adults.
 If you click on an application and the
URL does not have www.facebook or
has a URL that is just numbers like
10.263.18, immediately exit out of that
page.
 Always check your URL when
navigating in social networks like
MySpace and Facebook.
How to stop the bad guys
 1.Be suspicious of any email with
urgent requests for personal financial
information. DO NOT RESPOND TO
IT!
 Phisher emails are typically NOT
personalized
 Valid messages from your bank
ecommerce company generally are
How to stop the bad guys
 2.If you suspect an email message
might not be authentic . . .Don't use
the embedded links to get to another
web page.
 Call the company on the telephone, or
log onto the website directly by typing
the URL into the address bar
 Don’t cut and paste the link from the
message into your Internet browser –
the phisers can redirect you to a
different site
How to stop the bad guys
 3. Avoid filling out forms in email
messages that ask for personal
financial information.
 Phishers make very good fake forms
 Only communicate personal financial
information via a secure website or the
telephone
How to stop the bad guys
 4. Don’t email personal or financial
information.
 Email is not a secure method of
transmitting personal information
 No one indicator is foolproof
 Some phishers have forged security
icons like the lock icon on an order
form
How to stop the bad guys
 5. Always ensure that you're using a
secure website when submitting credit
card or other sensitive information via
your Web browser.
 Check the beginning of the Web
address in your browsers address bar
 It should begin with "https://" rather
than just "http://".
How to stop the bad guys
 6.When shopping for an item on the
Internet
 Be sure the site is secure (https:
instead of http) before entering
personal financial information!
CYBER SAFETY
 SO THANKS EVERYONE AND NOW
I HOPE YOU ALL HAD
UNDERSTOOD UBOUT CYBER
SAFETY.
 SO BE SAFE.
THANKS!

Más contenido relacionado

La actualidad más candente

Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
kscheidy
 

La actualidad más candente (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Social engineering
Social engineering Social engineering
Social engineering
 
Phishing
PhishingPhishing
Phishing
 
Internet safety
Internet safetyInternet safety
Internet safety
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 

Similar a Cyber safety

Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
rehmannb
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
Linda Barron
 
Inter safety 2011
Inter safety 2011Inter safety 2011
Inter safety 2011
temgamarra
 

Similar a Cyber safety (20)

Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
123.pptx
123.pptx123.pptx
123.pptx
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tanta
 
My protection plan
My protection planMy protection plan
My protection plan
 
Teaching Cyber Safety
Teaching Cyber SafetyTeaching Cyber Safety
Teaching Cyber Safety
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Cyber
CyberCyber
Cyber
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Ethics On The Internet
Ethics On The InternetEthics On The Internet
Ethics On The Internet
 
Inter safety 2011
Inter safety 2011Inter safety 2011
Inter safety 2011
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 

Más de Shruti Bansal

Más de Shruti Bansal (15)

ART INTERGRATED PROJECT ON PUNJAB AND ANDHRA PRADESH
ART INTERGRATED PROJECT ON PUNJAB AND ANDHRA PRADESHART INTERGRATED PROJECT ON PUNJAB AND ANDHRA PRADESH
ART INTERGRATED PROJECT ON PUNJAB AND ANDHRA PRADESH
 
LIFE OF MAHARANA PRATAP-THE GREAT WARRIOR
LIFE OF MAHARANA PRATAP-THE GREAT WARRIORLIFE OF MAHARANA PRATAP-THE GREAT WARRIOR
LIFE OF MAHARANA PRATAP-THE GREAT WARRIOR
 
HOW TO EAT A BALANCED DIET?
HOW TO EAT A BALANCED DIET?HOW TO EAT A BALANCED DIET?
HOW TO EAT A BALANCED DIET?
 
APJ ABDUL KALAM.pptx
APJ ABDUL KALAM.pptxAPJ ABDUL KALAM.pptx
APJ ABDUL KALAM.pptx
 
EARTH-OUR BEAUTIFUL HOME.pptx
EARTH-OUR BEAUTIFUL HOME.pptxEARTH-OUR BEAUTIFUL HOME.pptx
EARTH-OUR BEAUTIFUL HOME.pptx
 
7 WONDERS OF THE WORLD
7 WONDERS OF THE WORLD7 WONDERS OF THE WORLD
7 WONDERS OF THE WORLD
 
ENVIRONMENTAL CONCERNS
ENVIRONMENTAL CONCERNSENVIRONMENTAL CONCERNS
ENVIRONMENTAL CONCERNS
 
ONLINE EDUCATION.pptx
ONLINE EDUCATION.pptxONLINE EDUCATION.pptx
ONLINE EDUCATION.pptx
 
MOTHER TERESA
MOTHER TERESAMOTHER TERESA
MOTHER TERESA
 
THE QUEEN OF JHANSI-RANI LAXMI BAI
THE QUEEN OF JHANSI-RANI LAXMI BAITHE QUEEN OF JHANSI-RANI LAXMI BAI
THE QUEEN OF JHANSI-RANI LAXMI BAI
 
IMPORTANCE OF EDUCATION
IMPORTANCE OF EDUCATIONIMPORTANCE OF EDUCATION
IMPORTANCE OF EDUCATION
 
Animal testing
Animal testingAnimal testing
Animal testing
 
Swami vivekananda
Swami vivekanandaSwami vivekananda
Swami vivekananda
 
Importance of trees
Importance of treesImportance of trees
Importance of trees
 
Carnatic music
Carnatic   musicCarnatic   music
Carnatic music
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Cyber safety

  • 1. HELLO EVERYONE! I AM GOING TO PRESENT A PPT PRESENTATION OF CYBER SAFETY. HOPE YOU WILL ENJOY!!
  • 3. CYBERBULLING  involves the use of electronic devices  supports deliberate, repeated, and hostile behavior by an individual or group  its intent is to harm others.
  • 4. What is Cyberbullying  According to a survey done in 2007 by the National Crime and Protection Council:​  43% of teens report that they have experienced some form of cyberbullying that year.  The incidence of cyberbullying is higher among females than males. More than 50% of females age 15 to 16 years of age reported at least one cyberbullying incident.
  • 5. Why do teens cyberbully?  81% Because they think it is funny​  64% Because they don’t like the person​  45% Because they view the victim as a loser​  47% Because they feel there are no consequences for cyberbullying  45% Because they don’t think they will get caught​  58% of students surveyed don’t think  cyberbullying is a big deal​
  • 6. Stop Cyber bullying Rachael was stalked online by anonymous bully. She died by suicide on October 9, 2006.
  • 7. Stop Cyber bullying Ryan, a 13-year old, who died by suicide as a result of bullying at school and online.
  • 8. Stop Cyber bullying  A cruel online hoax by a neighbor led to the suicide death of Megan.
  • 9. What is a cyber-predator?  A cyber-predator uses the internet to hunt for victims to take advantage of them in some way:  Emotionally  Sexually  Psychologically  Financially A cyber-predator knows how to manipulate people by creating trust and friendships where none should exist.
  • 10. What is a cyber-predator?  77% of the target for online predators are teens aged 14 and older.  33% of teens received an aggressive sexual solicitation online in the past year.  75% of children are willing to share personal information online about themselves and their family in exchange for goods and services
  • 11. What is Phishing  Phishing is the act of requesting confidential information over the Internet under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.
  • 12. Phishing  15% of online teens have received a fraudulent message, compared with 22% of adults.  If you click on an application and the URL does not have www.facebook or has a URL that is just numbers like 10.263.18, immediately exit out of that page.  Always check your URL when navigating in social networks like MySpace and Facebook.
  • 13. How to stop the bad guys  1.Be suspicious of any email with urgent requests for personal financial information. DO NOT RESPOND TO IT!  Phisher emails are typically NOT personalized  Valid messages from your bank ecommerce company generally are
  • 14. How to stop the bad guys  2.If you suspect an email message might not be authentic . . .Don't use the embedded links to get to another web page.  Call the company on the telephone, or log onto the website directly by typing the URL into the address bar  Don’t cut and paste the link from the message into your Internet browser – the phisers can redirect you to a different site
  • 15. How to stop the bad guys  3. Avoid filling out forms in email messages that ask for personal financial information.  Phishers make very good fake forms  Only communicate personal financial information via a secure website or the telephone
  • 16. How to stop the bad guys  4. Don’t email personal or financial information.  Email is not a secure method of transmitting personal information  No one indicator is foolproof  Some phishers have forged security icons like the lock icon on an order form
  • 17. How to stop the bad guys  5. Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser.  Check the beginning of the Web address in your browsers address bar  It should begin with "https://" rather than just "http://".
  • 18. How to stop the bad guys  6.When shopping for an item on the Internet  Be sure the site is secure (https: instead of http) before entering personal financial information!
  • 19. CYBER SAFETY  SO THANKS EVERYONE AND NOW I HOPE YOU ALL HAD UNDERSTOOD UBOUT CYBER SAFETY.  SO BE SAFE. THANKS!