SlideShare une entreprise Scribd logo
1  sur  15
INTERNET
SAFETY
TOOLS OF INTERNET
World Wide Web (WWW): This is the part of the internet
that most people are most familiar with. It's the system of
interconnected documents and other resources that can be
accessed via a web browser.
Domain: A domain is the part of a web address that identifies
a particular website. For example, in the web address
"www.example.com", "example.com" is the domain
• IP address: An IP address is a numerical label Router: A
router is a device that connects computer networks together
and allows data to be transmitted between them. It routes
data packets between devices on a network.each device
connected to a computer network that uses the Internet
Protocol for communication. An IP address serves two main
functions: it identifies the host or device, and it provides the
location of the host in the network.
• Server: A server is a computer that provides services to other
computers or devices. For example, a web server is a
computer that stores and serves web pages to users.
• Router: A router is a device that connects computer
networks together and allows data to be transmitted
between them. It routes data packets between devices on a
network.
• Use strong and unique passwords: Use a combination
of letters, numbers, and special characters in your
passwords and make sure to use different passwords
for different accounts.
• Enable two-factor authentication: This adds an extra
layer of security to your accounts by requiring you to
enter a code sent to your phone or email in addition to
your password.
• Be Careful Who You Meet Online-People you meet
online are not always who they claim to be. Indeed,
they may not even be real. As InfoWorld reports, fake
social media profiles are a popular way for hackers to
cozy up to unwary Web users and pick their cyber
• Keep Personal Information Professional and Limited-
Potential employers or customers don't need to know your
personal relationship status or your home address. They do
need to know about your expertise and professional
background, and how to get in touch with you. You wouldn't
hand purely personal information out to strangers
individually—don't hand it out to millions of people online.
• . Keep Your Privacy Settings On-Marketers love to know all
about you, and so do hackers. Both can learn a lot from your
browsing and social media usage. But you can take charge of
your information. As noted by Lifehacker, both web browsers
and mobile operating systems have settings available to
protect your privacy online. Major websites like Facebook
also have privacy-enhancing settings available.
• Be cautious of phishing attacks: Be wary of emails or website
that ask for personal information or login credentials. If you're
unsure about the legitimacy of an email or website, do some
research or contact the company directly.
• Install anti-virus software: This can help protect your
computer from malware and viruses that can steal your
personal information or damage your system.
• Be mindful of what you share online: Think twice before
posting personal information or photos online, and be
cautious about accepting friend requests from strangers
• Make Sure Your Internet Connection is Secure.- Use a
Secure VPN Connectionimprove your Internet browsing
safety, use secure VPN connection (virtual private network ).
VPN enables you to have a secure connection between your
device and an Internet server that no one can monitor or
access the data that you’re exchanging.
• Make Online Purchases From Secure Sites-Any time you
make a purchase online, you need to provide credit card or
bank account information—just what cybercriminals are
most eager to get their hands on. Only supply this
information to sites that provide secure, encrypted
connections.
TYPES OF INTERNET ISSUES
•Malware-
• Malware is one of the types of attacks that need maximum defense by a
Cyber Safety system. Typically, malware enters your system/ network
and denies access to the critical components of the network. There are
various types of it such as-
• Viruses-A virus usually comes as an attachment in an email that holds a
virus payload, or the part of the malware that performs the malicious
action. Once the victim opens the file, the device is infected.
• Spyware-Spyware is a program installed on your computer, usually
without your explicit knowledge, that captures and transmits personal
information or Internet browsing habits and details to its user.
•PHISING-
• Phising attacks are the practice of sending fraudulent
communications that appear to come from a reputable
source. It is usually done through email. The goal is to steal
sensitive data like credit card and login information, or to
install malware on the victim’s machine. Phishing is a
common type of cyber attack that everyone should learn
about in order to protect themselves.Phishing starts with a
fraudulent email or other communication that is designed
to lure a victim. The message is made to look as though it
comes from a trusted sender. If it fools the victim, he or she
is coaxed into providing confidential information, often on a
scam website.
CYBER SECURITY
A cyber security threat refers to any possible malicious attack
that seeks to unlawfully access data, disrupt digital operations
or damage information. Cyber threats can originate from
various actors, including corporate spies, hacktivists, terrorist
groups, hostile nation-states, criminal organizations, lone
hackers and disgruntled employees.
CYBER BULLYING
Cyberbullying is the act of using the internet to harm someone. There are
various forms of cyberbullying.
Flaming – This type of cyberbullying involves online fights with angry and vulgar
messages.
Harassment – Online harassment can take the form of insulting, mean, and
derogatory messages online.
Denigration – Denigration is when someone posts rumors or gossip about
someone online, with the purpose of damaging their reputation.
Impersonation – Impersonation means pretending to be someone else to get
them in trouble.
Outing – Outing is when someone shares somebody else’s secrets, images or
information online.
Trickery – When people trick someone into revealing things and then post them
online, it’s called Trickery.
Exclusion – Exclusion is when an individual or a group of people intentionally
keeps someone out of an online group.
Cyberstalking – Cyberstalking is usually done to create fear in an individual using
repeated harassment and denigration.
CYBER BULLYING PREVENTION TIPS FOR
STUDENTS
• TALK ABOUT IT.- If you’re the target of cyberbullying.
Whether it’s your parents, a teacher, or another trusted
adult, or even your best friend, never keep to yourself the
fact that you’re being bullied.
• IGNORE THEM- If there is an isolated incident where you
are being bullied, don’t respond to the instigator. Those
who cyberbully but who do not get a response from their
target may just move on.
• NEVER RETALIATE- Be the bigger person and never retaliate
against someone who is mean to you. Retaliation only
further perpetuates the cycle of violence, and does nothing
to solve the problem.
• SAVE THE EVIDENCE-. Record all instances of cyberbullying.
Print out social media posts and emails, save texts, and
capture screen shots when cyberbullying occurs. You can
even make screen recordings of Snapchat, Facebook, or
Instagram Stories.
• REPORT IT TO THE CONTENT PROVIDER.- If don’t know
who is cyberbullying you, contact the provider of the site or
platform where the cyberbullying is occurring and make a
report.
SAFE DIGITAL BANKING
INTERNET SAFETY-WPS Office (1).pptx

Contenu connexe

Similaire à INTERNET SAFETY-WPS Office (1).pptx

Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessShwetaSingh713663
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxRavinderSingh172970
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdfMILANOP1
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 

Similaire à INTERNET SAFETY-WPS Office (1).pptx (20)

Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber Awareness
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

Dernier

Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensSocioCosmos
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpointAshtonCains
 
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrSapana Sha
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Delhi Call girls
 
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"SocioCosmos
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for siteAshtonCains
 
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Delhi Call girls
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSheikhSaifAli1
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDYgalaxypingy
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxednyonat
 
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRElite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRDelhi Call girls
 
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxFactors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxvemusae
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosSocioCosmos
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...SocioCosmos
 
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Delhi Call girls
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for siteAshtonCains
 

Dernier (20)

Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
 
🔝9953056974 🔝Call Girls In Mehrauli Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Mehrauli  Escort Service Delhi NCR🔝9953056974 🔝Call Girls In Mehrauli  Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Mehrauli Escort Service Delhi NCR
 
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for site
 
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketing
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDY
 
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
 
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRElite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
 
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptxFactors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
Factors-on-Authenticity-and-Validity-of-Evidences-and-Information.pptx
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with Sociocosmos
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 

INTERNET SAFETY-WPS Office (1).pptx

  • 2. TOOLS OF INTERNET World Wide Web (WWW): This is the part of the internet that most people are most familiar with. It's the system of interconnected documents and other resources that can be accessed via a web browser. Domain: A domain is the part of a web address that identifies a particular website. For example, in the web address "www.example.com", "example.com" is the domain
  • 3. • IP address: An IP address is a numerical label Router: A router is a device that connects computer networks together and allows data to be transmitted between them. It routes data packets between devices on a network.each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: it identifies the host or device, and it provides the location of the host in the network. • Server: A server is a computer that provides services to other computers or devices. For example, a web server is a computer that stores and serves web pages to users. • Router: A router is a device that connects computer networks together and allows data to be transmitted between them. It routes data packets between devices on a network.
  • 4. • Use strong and unique passwords: Use a combination of letters, numbers, and special characters in your passwords and make sure to use different passwords for different accounts. • Enable two-factor authentication: This adds an extra layer of security to your accounts by requiring you to enter a code sent to your phone or email in addition to your password. • Be Careful Who You Meet Online-People you meet online are not always who they claim to be. Indeed, they may not even be real. As InfoWorld reports, fake social media profiles are a popular way for hackers to cozy up to unwary Web users and pick their cyber
  • 5. • Keep Personal Information Professional and Limited- Potential employers or customers don't need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn't hand purely personal information out to strangers individually—don't hand it out to millions of people online. • . Keep Your Privacy Settings On-Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing and social media usage. But you can take charge of your information. As noted by Lifehacker, both web browsers and mobile operating systems have settings available to protect your privacy online. Major websites like Facebook also have privacy-enhancing settings available.
  • 6. • Be cautious of phishing attacks: Be wary of emails or website that ask for personal information or login credentials. If you're unsure about the legitimacy of an email or website, do some research or contact the company directly. • Install anti-virus software: This can help protect your computer from malware and viruses that can steal your personal information or damage your system. • Be mindful of what you share online: Think twice before posting personal information or photos online, and be cautious about accepting friend requests from strangers
  • 7. • Make Sure Your Internet Connection is Secure.- Use a Secure VPN Connectionimprove your Internet browsing safety, use secure VPN connection (virtual private network ). VPN enables you to have a secure connection between your device and an Internet server that no one can monitor or access the data that you’re exchanging. • Make Online Purchases From Secure Sites-Any time you make a purchase online, you need to provide credit card or bank account information—just what cybercriminals are most eager to get their hands on. Only supply this information to sites that provide secure, encrypted connections.
  • 8. TYPES OF INTERNET ISSUES •Malware- • Malware is one of the types of attacks that need maximum defense by a Cyber Safety system. Typically, malware enters your system/ network and denies access to the critical components of the network. There are various types of it such as- • Viruses-A virus usually comes as an attachment in an email that holds a virus payload, or the part of the malware that performs the malicious action. Once the victim opens the file, the device is infected. • Spyware-Spyware is a program installed on your computer, usually without your explicit knowledge, that captures and transmits personal information or Internet browsing habits and details to its user.
  • 9. •PHISING- • Phising attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim’s machine. Phishing is a common type of cyber attack that everyone should learn about in order to protect themselves.Phishing starts with a fraudulent email or other communication that is designed to lure a victim. The message is made to look as though it comes from a trusted sender. If it fools the victim, he or she is coaxed into providing confidential information, often on a scam website.
  • 10. CYBER SECURITY A cyber security threat refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations or damage information. Cyber threats can originate from various actors, including corporate spies, hacktivists, terrorist groups, hostile nation-states, criminal organizations, lone hackers and disgruntled employees.
  • 11. CYBER BULLYING Cyberbullying is the act of using the internet to harm someone. There are various forms of cyberbullying. Flaming – This type of cyberbullying involves online fights with angry and vulgar messages. Harassment – Online harassment can take the form of insulting, mean, and derogatory messages online. Denigration – Denigration is when someone posts rumors or gossip about someone online, with the purpose of damaging their reputation. Impersonation – Impersonation means pretending to be someone else to get them in trouble. Outing – Outing is when someone shares somebody else’s secrets, images or information online. Trickery – When people trick someone into revealing things and then post them online, it’s called Trickery. Exclusion – Exclusion is when an individual or a group of people intentionally keeps someone out of an online group. Cyberstalking – Cyberstalking is usually done to create fear in an individual using repeated harassment and denigration.
  • 12. CYBER BULLYING PREVENTION TIPS FOR STUDENTS • TALK ABOUT IT.- If you’re the target of cyberbullying. Whether it’s your parents, a teacher, or another trusted adult, or even your best friend, never keep to yourself the fact that you’re being bullied. • IGNORE THEM- If there is an isolated incident where you are being bullied, don’t respond to the instigator. Those who cyberbully but who do not get a response from their target may just move on.
  • 13. • NEVER RETALIATE- Be the bigger person and never retaliate against someone who is mean to you. Retaliation only further perpetuates the cycle of violence, and does nothing to solve the problem. • SAVE THE EVIDENCE-. Record all instances of cyberbullying. Print out social media posts and emails, save texts, and capture screen shots when cyberbullying occurs. You can even make screen recordings of Snapchat, Facebook, or Instagram Stories. • REPORT IT TO THE CONTENT PROVIDER.- If don’t know who is cyberbullying you, contact the provider of the site or platform where the cyberbullying is occurring and make a report.