Want to create interactive content? It’s easy in Genially!

Get started free

Spring dossier

MINASCURTA ARIADNA

Created on February 9, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

PRESENTATION

Start

Index

4.) consequences

1.) definition

5.) counter measures

2.) characteristics

  • CYBERSECURITY

3) why bully?

01

What is cyperbullying ?

Origin of the word

Definition

The term "bullying" comes from the English "bully", which means "thug" or "bully". ( in italiano: ,,teppista" o ,,prepotente" )

Cyberbullying is bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms and mobile phones. It is repeated behaviour, aimed at scaring, angering or shaming those who are targeted.

+ info

Home

02

1.)Persistent

2.) Hard to detect.

HOW CAN IT BE?

3.) Anonymous

5.) Easier to be hurtful.

4.) Shared to a potentially larger audience.

6.) Permanent.

Home

WHY BULLY?

The reasons behind bullying are difficult to identify and often have a deep origin: the reasons why young people bully are:

  • to feel powerful and in control of the situation and establish social dominance
  • to deal with feelings of anger or fear
  • to accommodate peer pressure
  • because they have little social skills and self-control skills
  • because they have themselves been victims of bullying or violence
  • to address self-esteem and confidence issues

Home

quence

Conse

Cyberbullying has many negative effects, some of them can lead to serious mental health problems. People who are victims of cyberbullying are twice as likely to experience suicidal thoughts, actions or behaviors and to commit acts of self-harm than those who are not

  • Depression
  • Anxiety
  • Sleep disturbance
  • Violent behaviors
  • Inability to feel safe
  • High levels of strees
  • Feelings of loneliness and isolation
  • Stomach pain and digestiv issues
  • Feelings of powerlessness and hopelessness

Home

KEEP EVERYTHING

DON'T ENGAGE

TELL SOMEONE

COUNTER MEASURES

KEEP DATA SECURE

DON'T GET TURNED AROUND

STAND TOGETHER

Like physical bullying, there are a number of measures that you can take (as an adult or a minor) to prevent cyberbullying from continuing.

LEARNE MORE

Home

Cyber security

What is it?

Cybersecurity is the practice of protecting systems, networks and programs from digital attacks. These cyber attacks are usually aimed at accessing, transforming or destroying sensitive information.

Next

Information security protects the integrity and privacy of data, both in storage and in transit.

· Operational security includes the processes and decisions for handling and protecting data assets.

Th e categories

The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.

· Network security is the practice of securing a computer network from intruders

· Application security focuses on keeping software and devices free of threats.

Next

Types of cyber threats

1.) Malware

2.) Phishing

3.) SQL injection An SQL

The threats countered by cyber-security are three-fold:

Next

1.) Use anti-virus software

Cyber safety tips

2.) Use strong passwords

3.) Update your software and operating system:

4.) Avoid using unsecure WiFi networks in public places

  • protect yourself against cyberattacks

5.) Do not click on links in emails from unknown senders or unfamiliar websites

How can businesses and individuals guard against cyber threats? There are some examples:

6.) Do not open email attachments from unknown senders

LUCHETTI ANGELA ASSADI AYA MINASCURTA ARIADNA 3ASIA

For example the parents must ensure that they educate theyr children about being respectful of other people's feelings and privacy online. Explain to them very clearly how they should react online and how they should behave in general.

According to enough.org, almost half of young people aged 13 to 17 have experienced cyberbullying. Teachers also think it's a big problem in classrooms. As parents, it's important to know what theyr kids are doing online and use cybersecurity to keep them safe. A lot of people think only boys bully, but that's not true. Both boys and girls can be victims and bullies. Boys are more likely to get cyberbullied while gaming, and girls are more likely to experience it on social media.

The Victims should ignore the attacks, report the situation to an adult, and block the bully from social media and email accounts. Observers should also report problems to friends, family, or teachers. Blocking the bully actually prevents them from connecting to the victim's profile.

“Many teens see cyberbullying as a problem, but they see that schools, government and social media aren't doing enough to adress it, leavving them without support. So in this case is important to to ask a psychologist or parents for help

In some really sad cases of cyberbullying, bullies made fake profiles of the victims on Facebook and said mean things. So, it's important for you to be careful online. Don't share too many personal photos or info. Each of us must create a strong passwords and change them regularly. There are internet security tools that can help you to keep safe online.

It's important to stand together and look for long-lasting solutions to cyberbullying because cyberbullying carries a number of different legal implications, including intimidation, extortion, identity theft, and defamatory libel. As a result, it's important to understand your rights .

When a person finds themseves in a cyberbullying situation, it is important to collect evidence such as screenshots or photos of messages received. Also note down the date, time and other useful information. Bring everything to the police. Cyberbullying can be considered a serious crime.

Malware means malicious software. One of the most common cyber threats, malware is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer.

(structured language query) is a type of cyber-attack used to take control of and steal data from a database.

Phishing is when cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information. Phishing attacks are often used to dupe people into handing over credit card data and other personal information