Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Module 5 CYBERSECURITY SECURITY FOR

Cyber Safety TEACHERS (CTT)

for Students
4Cs of online risks
Content risks:
Spread of misinformation, racism,
antisemitism, radicalisation and
extremism

Contact risks:
Online grooming, child sexual exploitation,
sextortion, child sexual abuse material, Indicators of students
stalking, and blackmail
facing online abuse:
Conduct risks: Spend most of their time online.
Cyberbullying, trolling, sexting Hides about persons they interact
with online.

Shows withdrawal signs after using


Commerce/contract risks: the internet.
Identity theft, fraud or scams

Key stakeholders: PARENTS AND GUARDIANS


Set up parental controls

Teach children about social media etiquette

Attend cyber and online safety awareness training

Take an interest in their children’s online activities

Learn about the online risks faced by children

Key stakeholders: TEACHERS


Report any cyber incident experienced online

Obey and follow rules put in place while learning online

Do not give personal information to strangers online

Do not post or send pictures and videos to strangers online

Ask for permission before signing in to a new website

Key stakeholders: STUDENTS


Report any cyber incident experienced online

Obey and follow rules put in place while learning online

Do not give personal information to strangers online

Do not post or send pictures and videos to strangers online

Ask for permission before signing in to a new website

Cybersecurity in Reporting
the Classroom Channels
Students should:
Ensure the software on their devices is Child Helpline International.
up-to-date
Internet Watch Foundation (IWF) Portal
Shut down or lock devices when not in Take It Down
use.
International Centre for Missing and
Turn off location services Exploited Children (ICMEC)
Use kid-friendly search engines such as Reporting channels provided by social media
Kiddle platforms such as Facebook, Instagram,
Snapchat, TikTok, and X/Twitter.
Disable microphones when not in use
Reporting channels available in your country
Use strong passwords and password
managers

You might also like