SlideShare a Scribd company logo
1 of 8
Cyber safety By Micaela & Madeleine
What’s cyber bullying? Cyber bullying is when someone is being bullied online, (someone is sending mean messages or emails to you etc.) Forms of cyber bullying: Via emails Texts Through online chat rooms Putting others down online Putting photos online of others without their permission
Be aware these things can happen to you Identity theft Scam websites can use your personal details Hacking Cyber bullying  Text bullying-using a phone to bully someone
Tips to stay safe on the internet  Know all of your contacts  Never share your password or personal details(phone numbers, or full name) Stick up for friends that are being cyber-bullied and tell a teacher parent or trusted adult. Change your passwords regularly to ensure no one can access more than once. NEVER cyber-bully back If you are ever bullied keep the evidence  Report abuse If you are sent a nasty message press print screen to save that page and then report it Check the toolbar of a site to ensure its not don't subscribe to competitions on the internet or click on pop-ups. If you see something you don't like or feel uncomfortable about tell a parent.   Think twice before you ever decide to cyber-bully and think of the consciquences  Never agree to meet someone that you have met online alone or ask for permission Never use flirty pictures or name as display pictures or email address
Having a phone The dangers of having a phone could be you being bullied. Sometimes the bully doesn't even know what he/she is actually doing because when you text there is no expression in the way you speak. Allot of the time people don't realise that their caps lock is on and send you a text. Usually when people see capitals in texts they think it means your shouting at them and they could be offended. Another danger of having a phone is subscribing. If you have seen those adds on TV that say you can subscribe for free music? Well if you have you've probably had a problem. What this all really is a scam, when you subscribe your actually paying for it. And it takes forever to take it off but there is a solution all you need to do is reply and type in capitals STOP! And eventually they will stop.
Trojan, viruses & spam Trojan’s come from spam emails and sites with advertisements. They will “eat away at your firewall.” they bit by bit send files to the another computer    Allowing access to that person Viruses can damage and delete    files from your pc. Scan UBS's to prevent and stop     viruses Update virus scanner every 2-3 months
Examples Never open a spam email or one of these advertisement because they will send Trojans to “eat away at your firewall.”
                            By                      Micaela Hamilton                           And                     Madeleine Redgewell

More Related Content

Viewers also liked

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingst josephs
 
Cascading and BigData Problems
Cascading and BigData ProblemsCascading and BigData Problems
Cascading and BigData Problemscwensel
 
Productivity: The Key to Organizational Success
Productivity: The Key to Organizational SuccessProductivity: The Key to Organizational Success
Productivity: The Key to Organizational SuccessMuhammad Bilal
 
Fire Wall
Fire WallFire Wall
Fire Wallkarius
 

Viewers also liked (8)

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cascading and BigData Problems
Cascading and BigData ProblemsCascading and BigData Problems
Cascading and BigData Problems
 
Mapacrime
MapacrimeMapacrime
Mapacrime
 
Productivity: The Key to Organizational Success
Productivity: The Key to Organizational SuccessProductivity: The Key to Organizational Success
Productivity: The Key to Organizational Success
 
Fire Wall
Fire WallFire Wall
Fire Wall
 
Cetakan
CetakanCetakan
Cetakan
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Recently uploaded (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Cyberbullying presentation

  • 1. Cyber safety By Micaela & Madeleine
  • 2. What’s cyber bullying? Cyber bullying is when someone is being bullied online, (someone is sending mean messages or emails to you etc.) Forms of cyber bullying: Via emails Texts Through online chat rooms Putting others down online Putting photos online of others without their permission
  • 3. Be aware these things can happen to you Identity theft Scam websites can use your personal details Hacking Cyber bullying Text bullying-using a phone to bully someone
  • 4. Tips to stay safe on the internet Know all of your contacts Never share your password or personal details(phone numbers, or full name) Stick up for friends that are being cyber-bullied and tell a teacher parent or trusted adult. Change your passwords regularly to ensure no one can access more than once. NEVER cyber-bully back If you are ever bullied keep the evidence Report abuse If you are sent a nasty message press print screen to save that page and then report it Check the toolbar of a site to ensure its not don't subscribe to competitions on the internet or click on pop-ups. If you see something you don't like or feel uncomfortable about tell a parent. Think twice before you ever decide to cyber-bully and think of the consciquences Never agree to meet someone that you have met online alone or ask for permission Never use flirty pictures or name as display pictures or email address
  • 5. Having a phone The dangers of having a phone could be you being bullied. Sometimes the bully doesn't even know what he/she is actually doing because when you text there is no expression in the way you speak. Allot of the time people don't realise that their caps lock is on and send you a text. Usually when people see capitals in texts they think it means your shouting at them and they could be offended. Another danger of having a phone is subscribing. If you have seen those adds on TV that say you can subscribe for free music? Well if you have you've probably had a problem. What this all really is a scam, when you subscribe your actually paying for it. And it takes forever to take it off but there is a solution all you need to do is reply and type in capitals STOP! And eventually they will stop.
  • 6. Trojan, viruses & spam Trojan’s come from spam emails and sites with advertisements. They will “eat away at your firewall.” they bit by bit send files to the another computer Allowing access to that person Viruses can damage and delete files from your pc. Scan UBS's to prevent and stop viruses Update virus scanner every 2-3 months
  • 7. Examples Never open a spam email or one of these advertisement because they will send Trojans to “eat away at your firewall.”
  • 8. By Micaela Hamilton And Madeleine Redgewell