1 / 28

Cyberbullying

Cyberbullying. What is Cyber bullying?. Cyberbullying is sending or posting harmful or cruel text or images using the Internet or other digital communication devices It is sometimes referred to as online social cruelty or electronic bullying. It involves:.

ovid
Download Presentation

Cyberbullying

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyberbullying

  2. What is Cyber bullying? • Cyberbullying is sending or posting harmful or cruel text or images using the Internet or other digital communication devices • It is sometimes referred to as online social cruelty or electronic bullying.

  3. It involves: • Sending mean, vulgar, or threatening messages or images; • Posting sensitive, private information about another person; • Pretending to be someone else in order to make that person look bad; • Intentionally excluding someone from an online group

  4. Cyber bullying goes through: • E-mails, • Instant messaging, • Text or digital imaging messages sent on cell phones, • Web pages, • Web logs (blogs), • Chat rooms or discussion groups

  5. How it works: • There are two kinds of cyberbullying, direct attacks (messages sent to your kids directly) and cyberbullying by proxy (using others to help cyberbully the victim)

  6. Direct: • Instant Messaging/Text Messaging Harassment (kids may send hurtful messages to others.) • Stealing Passwords (steal to log on to other peoples accounts) • Blogs • Sending pictures through E-mails and Text Messages • Impersonation (posting as the victim)

  7. By Proxy: • When a cyber bully gets someone else to do the dirty work. • It is the most dangerous because it often gets adults involved.

  8. There are 4 types of cyber bullies: • The 'Vengeful Angel' • The 'Power-hungry' which includes 'Revenge of the Nerds' • The 'Mean Girl' • The 'Inadvertent’

  9. 4 types: • This video will briefly describe them.

  10. Why do kids cyber bully? • It is often caused by anger, revenge or frustration. • Some do it to entertain themselves.

  11. 5 tips to prevent it: • Tell kids to never pass along harmful or cruel messages or images. • Train kids to delete suspicious email messages without opening them. • Ask kids to step up to friends who are cyber bullying and tell them to stop. • Teach kids how to use technology to block communication with cyber bullies. • Speak to students about the importance of telling a parent or adult about any cyber bullying they’re witness to.

  12. Bill Belsley, 2004:Bullying.org Canada Incorporated, Circle Cochrane, Alberta http://www.cyberbullying.ca/pdf/Cyberbullying_Information.pdf • Stephen Duek, 2006 :http://www.lba.k12.nf.ca/cyberbullying/effects.htm

  13. Trojan Horse Virus

  14. What is it? • A Trojan Horse virus is an email virus usually released by an email attachment. • If opened, it will scour your hard drive for any personal and financial information such as your social security, account and PIN numbers. • Once it has collected your info, it is sent to a thief’s database.

  15. You are at risk if: • Not everyone is at risk of unwilling hosting a Trojan on their system. Perhaps your computer has no connections to the outside world. • If you are connected to the internet, then your machine may pick-up Trojans. • If you are connected to a network of other machines, your machine may be at risk from these same systems. • If your computer uses a CD player, a floppy drive, a ZIP drive or DVD player, then any of these may bring a Trojan into your system.

  16. How can I protect myself? • A good Anti-Trojan application will do all the work for you. • A-squared Anti-Malware is designed to quickly, thoroughly and easily keep your PC free from Trojan horses and malware. • Squared Anti-Malware is the background guard. It is able to block new infections with trojans or malware before they can become active

  17. What do they do? • A Trojan virus is simply a hidden virus than is loaded to a users PC without their knowledge, usually disguised as something else, picture, screen saver etc. • They have a variety of forms but fall into two main categories, malicious (causing damage) and Non-malicious. • The non damaging type are often used to discover things, often illegal collection of data. • The damaging variety have 6 main types, their program content is called a payload, it delivers the payload, meaning it downloads a program instruction that performs a specific function. They can be categorised as a Down loader, DOS attack, Data Destruction, Remote Access, Server Trojan and Security Software Disabler.

  18. Cnt’d • Specifically the Down Loader downloads more content to your PC.Data Destruction deletes files or changes them so that they no longer function. • The DOS (Denial of Service) attack is repeated accessing or sending of data to a specific target address, causing so much data to stack up that nothing else gets through, so your service to the website for example is denied. • Remote access means the installation of code to allow someone else access to your PC, not always with the intention of harm or destruction, but often to use the system resources for a higher purpose, and more often to use for disguising the System Hackers true identity and location. • Server Trojans are designed to restrict server access to whether it is access to Email, FTP, or to disable your Proxy server and more. Finally the Security Software Disabler does what its name suggests, disables your Anti virus and Firewall software often so that other malicious Trojans can be inserted into your system.

  19. How do I get rid of Trojans? • Clean Re-installation (operating system and other forms of software) • Anti-Virus Software • Anti-Trojan Programs. • IRC Help Channels

  20. How to avoid it in the future? • NEVER download blindly from people or sites which you aren't 100% sure about. In other words, as the old saying goes, don't accept candy from strangers • Even if the file comes from a friend, you still must be sure what the file is before opening it. • Beware of hidden file extensions! Windows by default hides the last extension of a file, so that innocuous-looking "susie.jpg" might really be "susie.jpg.exe" - an executable trojan. • NEVER use features in your programs that automatically get or preview files. • Never blindly type commands that others tell you to type, or go to web addresses mentioned by strangers, or run pre-fabricated programs or scripts (not even popular ones). • Don't be lulled into a false sense of security just because you run anti-virus programs. Those do not protect perfectly against many viruses and trojans, even when fully up to date. • Finally, don't download an executable program just to "check it out"

  21. 2010 About.com, a part of The New York Times Company : http://antivirus.about.com/b/2006/05/31/whats-a-trojan-horse-virus.htm • 2003 Trojan horse info : http://www.trojan-horse.info/en/protection.aspx • Joseph Lo: http://irchelp.org/irchelp/security/trojan.html#prevent

  22. Time Shares

  23. What is a time share? • Timeshare is when a group of people all buy one property and share it. • Everyone pays a certain rate, as well as a common area cost to make sure everything is up to date and kept clean.

  24. What is a time share scam? • You usually know you are being scammed when they offer anything from a new car- to a two week luxurious get away.

  25. Ways to avoid a time share scam: • Always read the fine print • If you were promised something that’s not in the contract DON’T sign it. • Don’t call a 1-900 number, they are most likely scams.

  26. How a timeshare scam is harmful: • Timeshares are very popular but there are many, many time when people get scammed and lose a huge amount of money. This can be very harmful to you. • You think that you are getting a good deal, and in return you lose all of your money and there’s nothing you can do if you sign the contract, which is why it is very important to read all of the fine print.

  27. How to protect yourself when traveling: • While on a bus or plane you should wear sunglasses so that a thief can’t tell if you’re sleeping or not. • If you find someone suspicious you should look them in the eye, because this may scare them off if they think you know what they’re up to. • If you’re carrying a purse make sure the strap is long enough to fit across you’re shoulder and keep one hand on it at all times. • Always sit near emergency exits. • It is important to stay confident and to not show fear.There is no reason to be afraid of traveling, but it is good to always be cautious and safe.

  28. Johnson Karyn, Traveling abroad safely: How to Protect Yourself and Your Belongings, 2005/ May 31/2010http://www.googobits.com/articles/p4-73-traveling-abroad-safely-how-to-protect-yourself-and-your-belongings.htmlLanford Audrey and Jim, Timeshare Scams, May 31/2010

More Related