Cyber Safety

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

Cyber Safety

Introduction to Cyber Crime


• Why is Cyber Security A concern?
Today internet, computers, smartphones and
other communication technology devices have
become an integral part of our life.
What are Cyber Crimes?
• Cyber crimes are offences that may be
committed against individuals, companies or
institutions by using computers, internet or
mobile technology.
Cyber Threats that can Impact anyone

• Cyber criminals want to get unauthorized


access to our sensitive information. In
majority of cases, the cyber criminals would
advent an attack with a clear cut objective, for
that they use some of the most effective
methods.
Some common ways used by cyber criminals
are
• Email spoofing: Sending out e-mails to you that
looks like genuine and from a trusted e-mail ID
but actually, they are not.

• Malicious Files Applications: Sending you


malicious and bad applications and files through
direct messaging, gaming, emails or websites
etc. in order to get access to your smart phone
and personal data.
• Social Engineering: Social Engineering is a
technique used by cybercriminals to gain your
confidence to get information from you.

• Cyber Bullying: A form of harassment or


bullying inflicted through the use of electronic
or communication devices such as computer,
mobile phone, laptop.
• Identity theft: Deliberate use of someone’s
identity to gain financial advantage or to
obtain credit and other benefits in the other
person’s name/ for counterparts disadvantage
or loss.

• Job Frauds: Fraudulent representation or a


deceptive activity on the part of an employee
or a prospective employee toward an
employer.
• Banking Frauds: Fraudulent obtaining money
from depositors by posing as a bank or other
financial institution.
• CYBER BULLYING
Cyber bullying is one of the common cyber
threats being faced by children and young
people.
Cyber bullying means using internet or mobile
technology to intentionally harass or bully
someone by sending rude, mean or hurtful
messages, comments and images/vides. A cyber
bully can use text messages, emails, social media
platforms, web pages, cha rooms, etc. to bully
others.
• Don’t accept friend requests from unknown
people on social media platforms.

• Don’t share your personal information like date


of Birth, address, and phone number on social
media or other online platforms.

• Remember what you post online remains there


so it is important to be careful and not to share
your phone number and other personal details
in comments or posts on social media platforms.
• Never install unwanted Software and Apps like
dating App, online games, etc. from unknown
sources.
• As a good netizen you should never share
mean comments or hurtful messages or
embarrassing pictures/videos online.
What can you do if you are a victim of cyber
bullying?
• Inform your parents/elders immediately:
Don’t feel your parents will restrict your online
activity or ask you not to use your computer/
smartphone. It is important to inform them so
that they can support and guide you. Narrate
the entire issue clearly to your parents/elders.
• Identify the bully: Try to identify if the bully is a
known person or a stranger.

• Block the bully: If bully is using social media


platforms to bully you, you can block him/her. All
the social media apps or services have the option
to block a user.

• Collect and Save posts/messages: that were used


against you. Such messages/posts can be used as
an evidence, if in case a legal action has to be
taken.
• Never respond to a bully aggressively: Bully
wants you to get aggressive and get into
heated argument. This adds mileage to the
information unwantedly. So the best way is to
ask the person politely to stop it and if he/she
becomes annoying, stop the chat/block
him/her.

• If your parents/elders feel the need, they can


contact local police station to lodge a
complaint against the bully.
• CYBER GROOMING
Cyber Gaming is growing as one of the major
cyber threats faced by children and teenagers. It
is a practice where someone builds an
emotional bond with children through social
media or messaging platforms with an objective
of gaining their trust for sexually abusing or
exploiting them.
• Initially, the cyber groomer can give you
compliments, gifts, modeling job offer and
later they can start sending obscene
messages, photographs or videos and will ask
you to share your sexually explicit images or
vides with them.
How you can protect yourself from becoming
a victim of cyber grooming:
• Don’t accept friend requests from unknown people
on social media platforms. Cyber groomer can even
create a fake account to befriend victims.

• Don’t share you personal information like date of


birth, address, phone number and school name on
social media platforms to select who can access you
posts online. Try to restrict access of your profile to
your friends only.
• ONLINE GROOMING
• E-MAIL FRAUD
• ONLINE TRANSACTION
• Safeguards for your social networking profiles

You might also like