Professional Documents
Culture Documents
IT Security Presentation William Matanga 49553 Usman Aftab Butt 49907
IT Security Presentation William Matanga 49553 Usman Aftab Butt 49907
Presentation
of threats of
can be identified by repeated behaviour and an intent to harm. Victims of
cyberbullying may experience lower self-esteem, increased suicidal ideation, and a
variety of negative emotional responses including being scared, frustrated, angry, or
communication depressed.
• Below are two types of cyberbullying commonly used on victims:
and electronic Cyberstalking
transactions: • Cyberstalking is a form of online harassment in which the perpetrator uses electronic
communications to stalk a victim. This is considered more dangerous than other
forms of cyberbullying because it generally involves a credible threat to the victim's
safety. Cyberstalkers may send repeated messages intended to threaten or harass,
and they may encourage others to do the same, either explicitly or by impersonating
their victim and asking others to contact them.
Trolling
Cyberbullying • Internet trolls intentionally try to provoke or offend others in order to elicit a
reaction. Trolls and cyberbullies do not always have the same goals: while some trolls
engage in cyberbullying, others may be engaged in comparatively harmless mischief.
A troll may be disruptive either for their own amusement or because they are
genuinely a combative person.
• Cyberbullying can be as simple as continuing to
send emails or text messages harassing someone
who has said they want no further contact with
Methods/platforms the sender. It may also include public actions such
as repeated threats, sexual remarks, pejorative
protect yourself
• Place appropriate restrictions and permissions on technology use as soon as
children are able to access electronics. Setting reasonable limits early can
prevent kids from becoming too attached to their computers and phones later
on, and encourages them to develop a healthy sense of self apart from their
and your children digital identity. This makes it easier for children to disengage from risky or
hurtful online communication as they age.
Cyberbullying
Encourage your son or daughter to come to you with questions about his or
her relationships at school and/or activity online. If they raise the issue of
getting their own phone, computer or social media account, discuss the rights
—and responsibilities—that come with that privilege. Together, you can
create a “Declaration of Rights and Responsibilities” detailing what behavior
your child can accept and display online.
3. Look for teachable moments—and be open to learning along with your kids.
• When appropriate, discuss personal or national stories about cyber bullying,
privacy, and other online risks with the whole family. Use these events as
icebreakers for conversations about what is and isn’t okay online—and what
you and your child can do during an unsafe situation. Ask how your child
might respond to certain incidents, and invite feedback about how you can
best help them with any issues online. Remember that both of your responses
are likely to change as your kids age, so keep these dialogues ongoing.
Phishing is the fraudulent attempt to obtain sensitive information
Identification or data, such as usernames, passwords and credit card details or
and analysis of other sensitive details, by impersonating oneself as a trustworthy
entity in a digital communication.
threats of
communication Phishing is an example of social engineering techniques used to
and electronic deceive users. Users are lured by communications purporting to
be from trusted parties such as social networking websites,
transactions: auction sites, banks, mails/messages from friends or
colleagues/executives, online payment systems or IT
administrators.