CYBER CRIME - PowerPoint PPT Presentation

agrata
cyber crime n.
Skip this Video
Loading SlideShow in 5 Seconds..
CYBER CRIME PowerPoint Presentation
Download Presentation
CYBER CRIME

play fullscreen
1 / 7
Download Presentation
CYBER CRIME
144 Views
Download Presentation

CYBER CRIME

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. CYBER CRIME e-rule e-safety e-care • PREPARED BY: • CA 11132 KANGESWARY A/P KUPPUSAMY • KE 11058 SHOBANA A/P SINNIAH

  2. E-RULE

  3. E-SAFETY •  Internet threats can come in various forms or attacks. • The Internet can create the illusion that strangers are actually “friends”. • The Internet can damage your reputation.

  4. CYBER BULLYING • Cyber BullyingCyber bullying is a form of cyber threat that embarrasses, mistreats or frightens its victim. This act is known to even cause mental and emotional disorders to victims. • If you are a victim of cyber bullying, follow these useful tips that are based on i-SAFE: 1. Continuously tell a trusted adult about the bullying, until someone takes action.2. Do not open or read messages sent by the cyber bullies.3. Tell your teacher or administrator at your school if it is school related.4. Do not erase the messages because they may be needed to take action.5. Protect yourself and never agree to meet face to face with anyone you meet online.6. If bullied via chatting or instant messaging, the “bully” can often be blocked.7. If you are threatened with harm, inform the local police.

  5. E-CAREProper Recycling and Disposing Computer Equipment

  6. REFERENCES • http://www.google.com.my/search?hl=en&sugexp=crf&cp=5&gs_id=p&xhr=t&q=e-rule&bav=on.2,or.r_gc.r_pw.r_qf.,cf.osb&biw=1280&bih=699&um=1&ie=UTF-8&tbm=isch&source=og&sa=N&tab=wi&ei=GNOiT6fwJ4LUrQfj-Nm_Bw#um=1&hl=en&tbm=isch&sa=1&q=internet+safety&oq=internet+&aq=0&aqi=g10&aql=&gs_l=img. • http://www.google.com.my/search?hl=en&sugexp=crf&cp=5&gs_id=p&xhr=t&q=e-rule&bav=on.2,or.r_gc.r_pw.r_qf.,cf.osb&biw=1280&bih=699&um=1&ie=UTF-8&tbm=isch&source=og&sa=N&tab=wi&ei=GNOiT6fwJ4LUrQfj-Nm_Bw#um=1&hl=en&tbm=isch&sa=1&q=CYBER+CRIME&oq=CYBER+CRIME&aq=f&aqi=g2g-s1g2g-s1g1g-s3&aql=&gs_l=img.3..0l2j0i10j0l2j0i10j0 • http://www.google.com.my/search?hl=en&sugexp=crf&cp=5&gs_id=p&xhr=t&q=e-rule&bav=on.2,or.r_gc.r_pw.r_qf.,cf.osb&biw=1280&bih=699&um=1&ie=UTF-8&tbm=isch&source=og&sa=N&tab=wi&ei=GNOiT6

  7. THANK YOU