Cyber safety is important because technology has become integrated into our lives. Cyber crimes are offenses committed using technology to harm individuals, companies, or institutions. Common cyber threats include email spoofing, malicious files and applications, social engineering, cyber bullying, identity theft, job frauds, and banking frauds. Cyber bullying and grooming are threats children face, with grooming involving building emotional bonds to gain trust for exploitation. It is important for children to avoid sharing personal details online, only accepting friend requests from known people, and informing parents if being bullied.
Cyber safety is important because technology has become integrated into our lives. Cyber crimes are offenses committed using technology to harm individuals, companies, or institutions. Common cyber threats include email spoofing, malicious files and applications, social engineering, cyber bullying, identity theft, job frauds, and banking frauds. Cyber bullying and grooming are threats children face, with grooming involving building emotional bonds to gain trust for exploitation. It is important for children to avoid sharing personal details online, only accepting friend requests from known people, and informing parents if being bullied.
Cyber safety is important because technology has become integrated into our lives. Cyber crimes are offenses committed using technology to harm individuals, companies, or institutions. Common cyber threats include email spoofing, malicious files and applications, social engineering, cyber bullying, identity theft, job frauds, and banking frauds. Cyber bullying and grooming are threats children face, with grooming involving building emotional bonds to gain trust for exploitation. It is important for children to avoid sharing personal details online, only accepting friend requests from known people, and informing parents if being bullied.
Cyber safety is important because technology has become integrated into our lives. Cyber crimes are offenses committed using technology to harm individuals, companies, or institutions. Common cyber threats include email spoofing, malicious files and applications, social engineering, cyber bullying, identity theft, job frauds, and banking frauds. Cyber bullying and grooming are threats children face, with grooming involving building emotional bonds to gain trust for exploitation. It is important for children to avoid sharing personal details online, only accepting friend requests from known people, and informing parents if being bullied.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 23
Cyber Safety
Introduction to Cyber Crime
• Why is Cyber Security A concern? Today internet, computers, smartphones and other communication technology devices have become an integral part of our life. What are Cyber Crimes? • Cyber crimes are offences that may be committed against individuals, companies or institutions by using computers, internet or mobile technology. Cyber Threats that can Impact anyone
• Cyber criminals want to get unauthorized
access to our sensitive information. In majority of cases, the cyber criminals would advent an attack with a clear cut objective, for that they use some of the most effective methods. Some common ways used by cyber criminals are • Email spoofing: Sending out e-mails to you that looks like genuine and from a trusted e-mail ID but actually, they are not.
• Malicious Files Applications: Sending you
malicious and bad applications and files through direct messaging, gaming, emails or websites etc. in order to get access to your smart phone and personal data. • Social Engineering: Social Engineering is a technique used by cybercriminals to gain your confidence to get information from you.
• Cyber Bullying: A form of harassment or
bullying inflicted through the use of electronic or communication devices such as computer, mobile phone, laptop. • Identity theft: Deliberate use of someone’s identity to gain financial advantage or to obtain credit and other benefits in the other person’s name/ for counterparts disadvantage or loss.
• Job Frauds: Fraudulent representation or a
deceptive activity on the part of an employee or a prospective employee toward an employer. • Banking Frauds: Fraudulent obtaining money from depositors by posing as a bank or other financial institution. • CYBER BULLYING Cyber bullying is one of the common cyber threats being faced by children and young people. Cyber bullying means using internet or mobile technology to intentionally harass or bully someone by sending rude, mean or hurtful messages, comments and images/vides. A cyber bully can use text messages, emails, social media platforms, web pages, cha rooms, etc. to bully others. • Don’t accept friend requests from unknown people on social media platforms.
• Don’t share your personal information like date
of Birth, address, and phone number on social media or other online platforms.
• Remember what you post online remains there
so it is important to be careful and not to share your phone number and other personal details in comments or posts on social media platforms. • Never install unwanted Software and Apps like dating App, online games, etc. from unknown sources. • As a good netizen you should never share mean comments or hurtful messages or embarrassing pictures/videos online. What can you do if you are a victim of cyber bullying? • Inform your parents/elders immediately: Don’t feel your parents will restrict your online activity or ask you not to use your computer/ smartphone. It is important to inform them so that they can support and guide you. Narrate the entire issue clearly to your parents/elders. • Identify the bully: Try to identify if the bully is a known person or a stranger.
• Block the bully: If bully is using social media
platforms to bully you, you can block him/her. All the social media apps or services have the option to block a user.
• Collect and Save posts/messages: that were used
against you. Such messages/posts can be used as an evidence, if in case a legal action has to be taken. • Never respond to a bully aggressively: Bully wants you to get aggressive and get into heated argument. This adds mileage to the information unwantedly. So the best way is to ask the person politely to stop it and if he/she becomes annoying, stop the chat/block him/her.
• If your parents/elders feel the need, they can
contact local police station to lodge a complaint against the bully. • CYBER GROOMING Cyber Gaming is growing as one of the major cyber threats faced by children and teenagers. It is a practice where someone builds an emotional bond with children through social media or messaging platforms with an objective of gaining their trust for sexually abusing or exploiting them. • Initially, the cyber groomer can give you compliments, gifts, modeling job offer and later they can start sending obscene messages, photographs or videos and will ask you to share your sexually explicit images or vides with them. How you can protect yourself from becoming a victim of cyber grooming: • Don’t accept friend requests from unknown people on social media platforms. Cyber groomer can even create a fake account to befriend victims.
• Don’t share you personal information like date of
birth, address, phone number and school name on social media platforms to select who can access you posts online. Try to restrict access of your profile to your friends only. • ONLINE GROOMING • E-MAIL FRAUD • ONLINE TRANSACTION • Safeguards for your social networking profiles