Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

IT Security

Presentation

William Matanga 49553


Usman Aftab Butt 49907
• Cyberbullying is when someone, typically a teenager, bullies or harasses others on
the internet and in other digital spaces, particularly on social media sites. Harmful
Identification bullying behaviour can include posting rumours, threats, sexual remarks, a victims'
personal information, or pejorative labels (i.e. hate speech). Bullying or harassment

of threats of
can be identified by repeated behaviour and an intent to harm. Victims of
cyberbullying may experience lower self-esteem, increased suicidal ideation, and a
variety of negative emotional responses including being scared, frustrated, angry, or
communication depressed.
• Below are two types of cyberbullying commonly used on victims:
and electronic Cyberstalking

transactions: • Cyberstalking is a form of online harassment in which the perpetrator uses electronic
communications to stalk a victim. This is considered more dangerous than other
forms of cyberbullying because it generally involves a credible threat to the victim's
safety. Cyberstalkers may send repeated messages intended to threaten or harass,
and they may encourage others to do the same, either explicitly or by impersonating
their victim and asking others to contact them.
Trolling
Cyberbullying • Internet trolls intentionally try to provoke or offend others in order to elicit a
reaction. Trolls and cyberbullies do not always have the same goals: while some trolls
engage in cyberbullying, others may be engaged in comparatively harmless mischief.
A troll may be disruptive either for their own amusement or because they are
genuinely a combative person.
• Cyberbullying can be as simple as continuing to
send emails or text messages harassing someone
who has said they want no further contact with
Methods/platforms the sender. It may also include public actions such
as repeated threats, sexual remarks, pejorative

commonly used for labels (i.e. hate speech) or defamatory false


accusations, ganging up on a victim by making the
person the subject of ridicule in online forums,
cyberbullying hacking into or vandalizing sites about a person,
and posting false statements as fact aimed a
discrediting or humiliating a targeted person.
Cyberbullying could be limited to posting rumours
about a person on the internet with the intention
of bringing about hatred in others' minds or
convincing others to dislike or participate in online
denigration of a target. It may go to the extent of
personally identifying victims of crime and
publishing materials defaming or humiliating
them. This could be through social networks like
Facebook, Twitter and Instagram.
• https://www.bbc.com/news/uk-northern-ireland-4168788
2

• The link above give us a detailed experience of what two


mothers in Ireland went through, with their children who
took their lives because of cyberbullying.
• The two victims include Ellie Trowbridge who started
receiving cyberbullying messages from the age of 11. The
first time she received a message she actually reported it to
Case Study her mother and her mother went on to escalate the issue
to the police to fix.
• The Mother thought it would stop till she noticed her child
was now self harming herself, this was because the child
never could understand why anyone could be so mean.
• The Mother tried taking Ellie to different doctors about it,
unfortunately about five or six weeks before she passed
away another message came through, again anonymously.
Elle just couldn't understand why somebody could be so
cruel and this just sent her spiralling.
https://www.fosi.org/good-digital-parenting/10-tips-protect-your-child-cyber-bull
ying

How Can You 1. Set healthy tech boundaries as early as possible.

protect yourself
• Place appropriate restrictions and permissions on technology use as soon as
children are able to access electronics. Setting reasonable limits early can
prevent kids from becoming too attached to their computers and phones later
on, and encourages them to develop a healthy sense of self apart from their

and your children digital identity. This makes it easier for children to disengage from risky or
hurtful online communication as they age.

from 2. Provide an open channel of communication for your child.


Cyberbullying
Encourage your son or daughter to come to you with questions about his or
her relationships at school and/or activity online. If they raise the issue of
getting their own phone, computer or social media account, discuss the rights
—and responsibilities—that come with that privilege. Together, you can
create a “Declaration of Rights and Responsibilities” detailing what behavior
your child can accept and display online.

3. Look for teachable moments—and be open to learning along with your kids.
• When appropriate, discuss personal or national stories about cyber bullying,
privacy, and other online risks with the whole family. Use these events as
icebreakers for conversations about what is and isn’t okay online—and what
you and your child can do during an unsafe situation. Ask how your child
might respond to certain incidents, and invite feedback about how you can
best help them with any issues online. Remember that both of your responses
are likely to change as your kids age, so keep these dialogues ongoing.
Phishing is the fraudulent attempt to obtain sensitive information
Identification or data, such as usernames, passwords and credit card details or
and analysis of other sensitive details, by impersonating oneself as a trustworthy
entity in a digital communication.
threats of
communication Phishing is an example of social engineering techniques used to
and electronic deceive users. Users are lured by communications purporting to
be from trusted parties such as social networking websites,
transactions: auction sites, banks, mails/messages from friends or
colleagues/executives, online payment systems or IT
administrators.

Phishing Attempts to deal with phishing incidents include legislation, user


training, public awareness, and technical security measures (the
latter being due to phishing attacks frequently exploiting
weaknesses in current web security).
• Typically carried out by email spoofing,
instant messaging, and text messaging,
Methods of phishing often directs users to enter
personal information at a fake website
Phishing which matches the look and feel of the
legitimate site.
https://www.macsparky.com/blog/2018/2/a-case-study-in-phish
ing

• In this case, they've created an email that looks a lot like it


came directly from Apple. It’s got the Apple Logo and the
YouTube logo and, on first glance, looks official. It informs me
that I’ve subscribed to YouTube Red for $149.99/month and it
gives me a handy link to unsubscribe. There be the dragons. If
I were to click on that link–I didn’t–it would ask me for my
iTunes login or my credit card (or both), and then the bad
guys would have my information. Game over.

Phishing Case How to protect yourself from Phishing


study • If you ever find yourself tempted to click on any link in an
email that involves a problem or access to any of your online
accounts, stop and think for a moment. Then go to the source
website itself and check. In this case, logging onto my iTunes
account would show that I have not, nor have I ever, signed
up for a YouTube Red subscription.
• Finally, there’s nothing wrong with proving yourself wrong on
this stuff. I recently got a “credit card expired” email from
Squarespace. Rather than clicking on the link, I went and
logged into my account and discovered that my credit card
had, in fact, expired. Better safe than sorry.

You might also like