The document summarizes a student's project on cyber safety. It covers topics like staying safe online, social networking, cyber bullying and stalking, and malware. The introduction defines internet safety and its importance, especially for children. Later sections discuss how to stay safe online, the risks of social media use, cyber bullying and stalking behaviors, common forms of malware, and solutions to cyber attacks.
The document summarizes a student's project on cyber safety. It covers topics like staying safe online, social networking, cyber bullying and stalking, and malware. The introduction defines internet safety and its importance, especially for children. Later sections discuss how to stay safe online, the risks of social media use, cyber bullying and stalking behaviors, common forms of malware, and solutions to cyber attacks.
The document summarizes a student's project on cyber safety. It covers topics like staying safe online, social networking, cyber bullying and stalking, and malware. The introduction defines internet safety and its importance, especially for children. Later sections discuss how to stay safe online, the risks of social media use, cyber bullying and stalking behaviors, common forms of malware, and solutions to cyber attacks.
INTRODUCTION INTERNET SAFETY OR ONLINE SAFETY OR CYBER SAFETY IS TRYING TO BE SAFE ON THE INTERNET AND IS THE KNOWLEDGE OF MAXIMIZING THE USER'S PERSONAL SAFETY AND SECURITY RISKS TO PRIVATE INFORMATION AND PROPERTY ASSOCIATED WITH USING THE INTERNET, AND THE SELF- PROTECTION FROM COMPUTER CRIME IN GENERAL. AS THE NUMBER OF INTERNET USERS CONTINUES TO GROW WORLDWIDE, INTERNETS, GOVERNMENTS AND ORGANIZATIONS HAVE EXPRESSED CONCERNS ABOUT THE SAFETY OF CHILDREN USING THE INTERNET. SAFER INTERNET DAY IS CELEBRATED WORLDWIDE IN FEBRUARY TO RAISE AWARENESS ABOUT INTERNET SAFETY. IN THE UK THE GET SAFE ONLINE CAMPAIGN HAS RECEIVED SPONSORSHIP FROM GOVERNMENT AGENCY SERIOUS ORGANIZED CRIME AGENCY (SOCA) AND MAJOR INTERNET COMPANIES SUCH AS MICROSOFT AND EBAY. ONLINE SAFETY IS REALLY IMPORTANT BECAUSE PEOPLE NEED TO KEEP SAFE ON THE INTERNET. STAYING SAFE ONLINE INTERNET SAFETY IS THE TOPIC OF TEACHING PEOPLE HOW TO BE SAFE WHEN USING THE INTERNET. IT IS PARTICULARLY IMPORTANT WHEN USING SOCIAL MEDIA, THROUGH WHICH PERSONAL INFORMATION IS SHARED. • INTERNET SAFETY IS MAINLY TAUGHT IN PRIMARY AND SECONDARY SCHOOLS AND FOCUSES ON MAKING SURE CHILDREN KNOW THAT: • YOU SHOULDN'T SHARE YOUR PERSONAL INFORMATION ON THE INTERNET, • YOU SHOULD THINK BEFORE YOU WRITE COMMENTS ABOUT PEOPLE - HOW IT COULD EFFECT THEM, • YOU SHOULD ALWAYS TELL AN ADULT IF THERE IS SOMETHING THAT UPSETS YOU, • YOU SHOULDN'T MEET SOMEONE YOU HAVE TALKED TO ON THE INTERNET WITHOUT AN ADULT. • CHOOSE A STRONG PASSWORD WITH DIFFERENT CHARACTERS AND NUMBERS. THERE ARE MORE ANOTHER WAYS TO SECURE YOUR DEVICES WHEN SURFING THROUGH INTERNET ,YOU CAN USE A VPN (VIRTUAL PRIVATE NETWORK) THEY ARE USUALLY MORE SECURE THEN SIMPLE , ALSO THEY HELP TO UNLOCK MANY WEBSITES WHICH ARE BLOCKED BY YOUR SERVICE PROVIDER , IT IS USUALLY RECOMMENDED TO USE A PAID SERVICE RATHER THAN USING FREE SERVICE. AND AN ANTI-VIRUS MUST HAVE TO BE IN YOUR DEVICE IF YOU WANT A SECURE SURFING. SOCIAL NETWORKING A SOCIAL NETWORK IS A SOCIAL STRUCTURE MADE UP OF A SET OF SOCIAL ACTORS (SUCH AS INDIVIDUALS OR ORGANIZATIONS), SETS OF DYADIC TIES, AND OTHER SOCIAL INTERACTIONS BETWEEN ACTORS. THE SOCIAL NETWORK PERSPECTIVE PROVIDES A SET OF METHODS FOR ANALYZING THE STRUCTURE OF WHOLE SOCIAL ENTITIES AS WELL AS A VARIETY OF THEORIES EXPLAINING THE PATTERNS OBSERVED IN THESE STRUCTURES. THE STUDY OF THESE STRUCTURES USES SOCIAL NETWORK ANALYSIS TO IDENTIFY LOCAL AND GLOBAL PATTERNS, LOCATE INFLUENTIAL ENTITIES, AND EXAMINE NETWORK DYNAMICS. SOCIAL NETWORKS AND THE ANALYSIS OF THEM IS AN INHERENTLY INTERDISCIPLINARY ACADEMIC FIELD WHICH EMERGED FROM SOCIAL PSYCHOLOGY, SOCIOLOGY, STATISTICS, AND GRAPH THEORY. GEORG SIMMEL AUTHORED EARLY STRUCTURAL THEORIES IN SOCIOLOGY EMPHASIZING THE DYNAMICS OF TRIADS AND "WEB OF GROUP AFFILIATIONS". JACOB MORENO IS CREDITED WITH DEVELOPING THE FIRST SOCIOGRAMS IN THE 1930S TO STUDY INTERPERSONAL RELATIONSHIPS. THESE APPROACHES WERE MATHEMATICALLY FORMALIZED IN THE 1950S AND THEORIES AND METHODS OF SOCIAL NETWORKS BECAME PERVASIVE IN THE SOCIAL AND BEHAVIORAL SCIENCES BY THE 1980S. SOCIAL NETWORK ANALYSIS IS NOW ONE OF THE MAJOR PARADIGMS IN CONTEMPORARY SOCIOLOGY, AND IS ALSO EMPLOYED IN A NUMBER OF OTHER SOCIAL AND FORMAL SCIENCES. TOGETHER WITH OTHER COMPLEX NETWORKS, IT FORMS PART OF THE NASCENT FIELD OF NETWORK SCIENCE. CYBER BULLYING CYBERBULLYING IS A FORM OF BULLYING OR HARASSMENT USING ELECTRONIC MEANS. CYBERBULLYING IS ALSO KNOWN AS ONLINE BULLYING. IT HAS BECOME INCREASINGLY COMMON, ESPECIALLY AMONG TEENAGERS. CYBERBULLYING IS WHEN SOMEONE, TYPICALLY TEENS, BULLY OR HARASS OTHERS ON THE INTERNET, PARTICULARLY ON SOCIAL MEDIA SITES. HARMFUL BULLYING BEHAVIOR CAN INCLUDE POSTING RUMORS, THREATS, SEXUAL REMARKS, A VICTIMS' PERSONAL INFORMATION, OR PEJORATIVE LABELS (I.E. HATE SPEECH). BULLYING OR HARASSMENT CAN BE IDENTIFIED BY REPEATED BEHAVIOR AND AN INTENT TO HARM. VICTIMS MAY EXPERIENCE LOWER SELF-ESTEEM, INCREASED SUICIDAL IDEATION, AND A VARIETY OF NEGATIVE EMOTIONAL RESPONSES, INCLUDING BEING SCARED, FRUSTRATED, ANGRY, AND DEPRESSED. AWARENESS IN THE UNITED STATES HAS RISEN IN THE 2010S, DUE IN PART TO HIGH-PROFILE CASES. SEVERAL US STATES AND OTHER COUNTRIES HAVE LAWS SPECIFIC TO CYBERBULLYING. SOME ARE DESIGNED TO SPECIFICALLY TARGET TEEN CYBERBULLYING, WHILE OTHERS USE LAWS EXTENDING FROM THE SCOPE OF PHYSICAL HARASSMENT. IN CASES OF ADULT CYBERHARASSMENT, THESE REPORTS ARE USUALLY FILED BEGINNING WITH LOCAL POLICE. RESEARCH HAS DEMONSTRATED A NUMBER OF SERIOUS CONSEQUENCES OF CYBERBULLYING VICTIMIZATION. INTERNET TROLLING IS A COMMON FORM OF BULLYING OVER THE INTERNET IN AN ONLINE COMMUNITY (SUCH AS IN ONLINE GAMING OR SOCIAL MEDIA) IN ORDER TO ELICIT A REACTION, DISRUPTION, OR FOR SOMEONE'S OWN PERSONAL AMUSEMENT. CYBERSTALKING IS ANOTHER FORM OF BULLYING OR HARASSMENT THAT USES ELECTRONIC COMMUNICATIONS TO STALK A VICTIM; THIS MAY POSE A CREDIBLE THREAT TO THE VICTIM. NOT ALL NEGATIVE INTERACTION ONLINE OR ON SOCIAL MEDIA CAN BE ATTRIBUTED TO CYBERBULLYING. RESEARCH SUGGESTS THAT THERE ARE ALSO INTERACTIONS ONLINE THAT RESULT IN PEER PRESSURE, WHICH CAN HAVE A NEGATIVE, POSITIVE, OR NEUTRAL IMPACT ON THOSE INVOLVED. CYBER STALKING CYBERSTALKING IS THE USE OF THE INTERNET OR OTHER ELECTRONIC MEANS TO STALK OR HARASS AN INDIVIDUAL, GROUP, OR ORGANIZATION. IT MAY INCLUDE FALSE ACCUSATIONS, DEFAMATION, SLANDER AND LIBEL. IT MAY ALSO INCLUDE MONITORING, IDENTITY THEFT, THREATS, VANDALISM, SOLICITATION FOR SEX, OR GATHERING INFORMATION THAT MAY BE USED TO THREATEN, EMBARRASS OR HARASS. CYBERSTALKING IS OFTEN ACCOMPANIED BY REAL-TIME OR OFFLINE STALKING. IN MANY JURISDICTIONS, SUCH AS CALIFORNIA, BOTH ARE CRIMINAL OFFENSES. BOTH ARE MOTIVATED BY A DESIRE TO CONTROL, INTIMIDATE OR INFLUENCE A VICTIM. A STALKER MAY BE AN ONLINE STRANGER OR A PERSON WHOM THE TARGET KNOWS. THEY MAY BE ANONYMOUS AND SOLICIT INVOLVEMENT OF OTHER PEOPLE ONLINE WHO DO NOT EVEN KNOW THE TARGET. CYBERSTALKING IS A CRIMINAL OFFENSE UNDER VARIOUS STATE ANTI- STALKING, SLANDER AND HARASSMENT LAWS. A CONVICTION CAN RESULT IN A RESTRAINING ORDER, PROBATION, OR CRIMINAL PENALTIES AGAINST THE ASSAILANT, INCLUDING JAIL. MALWARE MALWARE (A PORTMANTEAU FOR MALICIOUS SOFTWARE) IS ANY SOFTWARE INTENTIONALLY DESIGNED TO CAUSE DAMAGE TO A COMPUTER, SERVER, CLIENT, OR COMPUTER NETWORK.[1] MALWARE DOES THE DAMAGE AFTER IT IS IMPLANTED OR INTRODUCED IN SOME WAY INTO A TARGET'S COMPUTER AND CAN TAKE THE FORM OF DIRECTLY EXECUTABLE CODE, SCRIPTS, SO- CALLED "ACTIVE CONTENT" (MICROSOFT WINDOWS), AND OTHER FORMS OF DATA.[2] SOME KINDS OF MALWARE ARE LARGELY REFERRED TO IN THE MEDIA AS COMPUTER VIRUSES, WORMS, TROJAN HORSES, RANSOMWARE, SPYWARE, ADWARE, AND SCAREWARE, AMONG OTHER TERMS. MALWARE HAS A MALICIOUS INTENT, ACTING AGAINST THE INTEREST OF THE COMPUTER USER— AND SO DOES NOT INCLUDE SOFTWARE THAT CAUSES UNINTENTIONAL HARM DUE TO SOME DEFICIENCY, WHICH IS TYPICALLY DESCRIBED AS A SOFTWARE BUG. PROGRAMS OFFICIALLY SUPPLIED BY COMPANIES CAN BE CONSIDERED MALWARE IF THEY SECRETLY ACT AGAINST THE INTERESTS OF THE COMPUTER USER. FOR EXAMPLE, AT ONE POINT SONY MUSIC COMPACT DISCS SILENTLY INSTALLED A ROOTKIT ON PURCHASERS' COMPUTERS RUNNING MICROSOFT WINDOWS WITH THE INTENTION OF PREVENTING ILLICIT COPYING; BUT WHICH ALSO REPORTED ON USERS' LISTENING HABITS, AND UNINTENTIONALLY CREATED EXTRA SECURITY VULNERABILITIES.[3] ONE STRATEGY FOR PROTECTING AGAINST MALWARE IS TO PREVENT THE HARMFUL SOFTWARE FROM GAINING ACCESS TO THE TARGET COMPUTER. FOR THIS REASON, ANTIVIRUS SOFTWARE, FIREWALLS AND OTHER STRATEGIES ARE USED TO HELP PROTECT AGAINST THE INTRODUCTION OF MALWARE, IN ADDITION TO CHECKING FOR THE PRESENCE OF MALWARE AND MALICIOUS ACTIVITY AND RECOVERING FROM ATTACKS. SOLUTIONS AND STRATEGIES A CYBER ATTACK IS ANY TYPE OF OFFENSIVE ACTION THAT TARGETS COMPUTER INFORMATION SYSTEMS, INFRASTRUCTURES, COMPUTER NETWORKS OR PERSONAL COMPUTER DEVICES, USING VARIOUS METHODS TO STEAL, ALTER OR DESTROY DATA OR INFORMATION SYSTEMS. TODAY I’LL DESCRIBE THE 10 MOST COMMON CYBER ATTACK TYPES: DENIAL-OF-SERVICE (DOS) AND DISTRIBUTED DENIAL-OF-SERVICE (DDOS) ATT ACKS