SlideShare a Scribd company logo
1 of 10
Cybersecurity
Awareness
Robin Rafique
Cyber security Topics
• Cyber and the Internet are critical in helping us day-to-day
activities, from communicating via email to gathering information
via the Internet
• There are four cybersecurity topics that should help you .
• Identity Theft
• Fraud and Phishing
• Cyber Bullying and Ethics
• Cyber Predators
•
Robin Rafique
Identity Theft
• Identity theft is the illegal use of someone else’s personal
information in order to obtain money or credit
• Identity theft can happen to anyone in any location across the
country
– 8.1 million were victims of identity theft in 2010*
– Take simple steps to protect your online identity, such as:
– Locking and password protecting your computer and cell phone
– Not sharing specific personal information online, such as your
full name or birthday
– Setting proper privacy settings on social networking sites
Robin Rafique
Crime in the Modern World
 Massive amount of data:
• 247 billion email per day
• 234 million websites
• 5 billion mobile-phone
users
 ICT Infrastructures:
• Complex,rapidly growing
• Dynamically changing
• Hostile,adversary environment
 Cyber crime:
• One million victims daily
• Expected losses 297
• Billion Euro
 Ultra‐large Scale
Forensic
Investgations.
• Situation-aware methods
• Quanlified,measurable
• indicators
• Adaptive, self‐organizing models
Distributed, cooperative,autonomo
us
 Rule-of-Law:
• Culture,social behaviours
• Legal&privacy aspects
• Law as framework for ICT
• Law as contents of
ICT, Automation,programming of
legal rules
Robin Rafique
Fraud and Phishing
• Fraud is the intentional perversion of truth in order to induce
another to part with something of value or to surrender a legal right
• Phishing is a scam by which an email user is duped into revealing
personal or confidential information that the scammer can use
illicitly or fraudulently
• Fraud and phishing attacks may take the form of an authentic-
looking website or a personalized email
– In April 2011, a phishing scam targeted the Department of
Energy’s Oak Ridge Laboratory facility, shutting down email
and Internet access*
– Secure yourself from fraud and phishing attacks by:
– Working with your peers to identify and deal with phishing
attacks
– Educating your family and friends about the types of phishing
scams and what they can do to protect themselves
Robin Rafique
Cyber Bullying and Ethics
• Cyber bullying is the electronic posting of mean-spirited
messages about a person, often done anonymously
• Cyber ethics help Internet users understand what type of online
behavior is right and wrong
• Cyber bullying and poor cyber ethics are threats many teens and
young adults face not from strangers, but from their own peers
• Whatever anyone posts online about another person can be spread
virally, resulting in serious, unwarranted damage to an individual’s
reputation or personal well-being
• Avoid being a cyber bully and practice good cyber ethics by:
– Following the “golden rule” online and in real life – be nice
– Not saying or doing anything online that you wouldn’t do in
person
– Owning what you say and do online
Robin Rafique
Cyber Predators
• Cyber predators are people who search online for other people in
order to use, control, or harm them in some way
• Cyber predators target teens and young adults – both male and
female – on a regular basis, regardless of whether or not the victims
are 18 or above
• Social networking sites enhance a predator’s ability to target young
Americans, especially if they share personal information in your
profile
– 91% of young adults say they are social networking “friends”
with people they don’t know well*
– You never know who is behind the screen, so protect yourself
and your personal information
– If you are being targeted or harassed online, you should notify
your family or the proper authorities
Robin Rafique
Chatting with Kids About
Being Online Tips
• Have regular conversations about using the Internet.
• Talk to kids about online manners.
• Ask kids who they are in touch with online and what sites they visit.
• Use parental control options that allow you to block and filter
content, filter outgoing content and limit kid’s time online.
• Develop computer and cell phone rules, such as no cell phone use at
the dinner table, during homework or sleeping hours.
Robin Rafique
Tips
DO
• Stop before you post
something and think about
how you will feel if your
family, teachers, neighbors or
coaches see it.
• Limit your online friends to
people you actually know.
• Speak up if you feel
uncomfortable or threated by
something you see online.
DON’T
• Reply to text, email or pop up
messages that ask you for
personal information.
• Open attachments or click on
links that are suspicious or
come from strangers.
• Stand for bullying – online or
off.
• Post videos or photos of
someone without their
approval.
Robin Rafique
Thank you
RobinRafique

More Related Content

What's hot

Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
mjtheman
 

What's hot (20)

Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdf
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
CompTIA Security+ Guide
CompTIA Security+ GuideCompTIA Security+ Guide
CompTIA Security+ Guide
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 

Viewers also liked

Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
Adam Heller
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
Md Abu Syeem Dipu
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense
 

Viewers also liked (20)

Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and Mitigation
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
How to Protect Your Organization from the Ransomware Epidemic
How to Protect Your Organization from the Ransomware EpidemicHow to Protect Your Organization from the Ransomware Epidemic
How to Protect Your Organization from the Ransomware Epidemic
 
Army Social Media Presentation
Army Social Media PresentationArmy Social Media Presentation
Army Social Media Presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 

Similar to Cyber security awareness

NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
CatherineBagaan
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
CreepSquash
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
QEwebAdmin
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
icts-uct
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 

Similar to Cyber security awareness (20)

Online safety
Online safetyOnline safety
Online safety
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Cyber security awareness

  • 2. Cyber security Topics • Cyber and the Internet are critical in helping us day-to-day activities, from communicating via email to gathering information via the Internet • There are four cybersecurity topics that should help you . • Identity Theft • Fraud and Phishing • Cyber Bullying and Ethics • Cyber Predators • Robin Rafique
  • 3. Identity Theft • Identity theft is the illegal use of someone else’s personal information in order to obtain money or credit • Identity theft can happen to anyone in any location across the country – 8.1 million were victims of identity theft in 2010* – Take simple steps to protect your online identity, such as: – Locking and password protecting your computer and cell phone – Not sharing specific personal information online, such as your full name or birthday – Setting proper privacy settings on social networking sites Robin Rafique
  • 4. Crime in the Modern World  Massive amount of data: • 247 billion email per day • 234 million websites • 5 billion mobile-phone users  ICT Infrastructures: • Complex,rapidly growing • Dynamically changing • Hostile,adversary environment  Cyber crime: • One million victims daily • Expected losses 297 • Billion Euro  Ultra‐large Scale Forensic Investgations. • Situation-aware methods • Quanlified,measurable • indicators • Adaptive, self‐organizing models Distributed, cooperative,autonomo us  Rule-of-Law: • Culture,social behaviours • Legal&privacy aspects • Law as framework for ICT • Law as contents of ICT, Automation,programming of legal rules Robin Rafique
  • 5. Fraud and Phishing • Fraud is the intentional perversion of truth in order to induce another to part with something of value or to surrender a legal right • Phishing is a scam by which an email user is duped into revealing personal or confidential information that the scammer can use illicitly or fraudulently • Fraud and phishing attacks may take the form of an authentic- looking website or a personalized email – In April 2011, a phishing scam targeted the Department of Energy’s Oak Ridge Laboratory facility, shutting down email and Internet access* – Secure yourself from fraud and phishing attacks by: – Working with your peers to identify and deal with phishing attacks – Educating your family and friends about the types of phishing scams and what they can do to protect themselves Robin Rafique
  • 6. Cyber Bullying and Ethics • Cyber bullying is the electronic posting of mean-spirited messages about a person, often done anonymously • Cyber ethics help Internet users understand what type of online behavior is right and wrong • Cyber bullying and poor cyber ethics are threats many teens and young adults face not from strangers, but from their own peers • Whatever anyone posts online about another person can be spread virally, resulting in serious, unwarranted damage to an individual’s reputation or personal well-being • Avoid being a cyber bully and practice good cyber ethics by: – Following the “golden rule” online and in real life – be nice – Not saying or doing anything online that you wouldn’t do in person – Owning what you say and do online Robin Rafique
  • 7. Cyber Predators • Cyber predators are people who search online for other people in order to use, control, or harm them in some way • Cyber predators target teens and young adults – both male and female – on a regular basis, regardless of whether or not the victims are 18 or above • Social networking sites enhance a predator’s ability to target young Americans, especially if they share personal information in your profile – 91% of young adults say they are social networking “friends” with people they don’t know well* – You never know who is behind the screen, so protect yourself and your personal information – If you are being targeted or harassed online, you should notify your family or the proper authorities Robin Rafique
  • 8. Chatting with Kids About Being Online Tips • Have regular conversations about using the Internet. • Talk to kids about online manners. • Ask kids who they are in touch with online and what sites they visit. • Use parental control options that allow you to block and filter content, filter outgoing content and limit kid’s time online. • Develop computer and cell phone rules, such as no cell phone use at the dinner table, during homework or sleeping hours. Robin Rafique
  • 9. Tips DO • Stop before you post something and think about how you will feel if your family, teachers, neighbors or coaches see it. • Limit your online friends to people you actually know. • Speak up if you feel uncomfortable or threated by something you see online. DON’T • Reply to text, email or pop up messages that ask you for personal information. • Open attachments or click on links that are suspicious or come from strangers. • Stand for bullying – online or off. • Post videos or photos of someone without their approval. Robin Rafique