Spring dossier
MINASCURTA ARIADNA
Created on February 9, 2024
Over 30 million people build interactive content in Genially.
Check out what others have designed:
Transcript
Start
PRESENTATION
1.) definition
4.) consequences
5.) counter measures
- CYBERSECURITY
2.) characteristics
3) why bully?
Index
The term "bullying" comes from the English "bully", which means "thug" or "bully". ( in italiano: ,,teppista" o ,,prepotente" )
Cyberbullying is bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms and mobile phones. It is repeated behaviour, aimed at scaring, angering or shaming those who are targeted.
Origin of the word
+ info
Definition
What is cyperbullying ?
01
Home
HOW CAN IT BE?
6.) Permanent.
5.) Easier to be hurtful.
4.) Shared to a potentially larger audience.
3.) Anonymous
2.) Hard to detect.
1.)Persistent
02
Home
- because they have themselves been victims of bullying or violence
- to address self-esteem and confidence issues
- because they have little social skills and self-control skills
- to accommodate peer pressure
- to deal with feelings of anger or fear
- to feel powerful and in control of the situation and establish social dominance
The reasons behind bullying are difficult to identify and often have a deep origin: the reasons why young people bully are:
WHY BULLY?
Home
Cyberbullying has many negative effects, some of them can lead to serious mental health problems. People who are victims of cyberbullying are twice as likely to experience suicidal thoughts, actions or behaviors and to commit acts of self-harm than those who are not
- Feelings of powerlessness and hopelessness
- Inability to feel safe
- High levels of strees
- Violent behaviors
- Sleep disturbance
- Stomach pain and digestiv issues
- Anxiety
- Feelings of loneliness and isolation
- Depression
Conse
quence
Home
STAND TOGETHER
LEARNE MORE
KEEP EVERYTHING
Like physical bullying, there are a number of measures that you can take (as an adult or a minor) to prevent cyberbullying from continuing.
COUNTER MEASURES
DON'T GET TURNED AROUND
KEEP DATA SECURE
Home
DON'T ENGAGE
TELL SOMEONE
Next
What is it?
Cybersecurity is the practice of protecting systems, networks and programs from digital attacks. These cyber attacks are usually aimed at accessing, transforming or destroying sensitive information.
Cyber security
Thecategories
· Operational security includes the processes and decisions for handling and protecting data assets.
Information security protects the integrity and privacy of data, both in storage and in transit.
· Application security focuses on keeping software and devices free of threats.
Next
· Network security is the practice of securing a computer network from intruders
The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.
2.) Phishing
3.) SQL injection An SQL
1.) Malware
Next
The threats countered by cyber-security are three-fold:
Types of cyber threats
4.) Avoid using unsecure WiFi networks in public places
5.) Do not click on links in emails from unknown senders or unfamiliar websites
6.) Do not open email attachments from unknown senders
2.) Use strong passwords
1.) Use anti-virus software
3.) Update your software and operating system:
How can businesses and individuals guard against cyber threats? There are some examples:
- protect yourself against cyberattacks
Cyber safety tips
LUCHETTI ANGELA ASSADI AYAMINASCURTA ARIADNA 3ASIA
For example the parents must ensure that they educate theyr children about being respectful of other people's feelings and privacy online. Explain to them very clearly how they should react online and how they should behave in general.
According to enough.org, almost half of young people aged 13 to 17 have experienced cyberbullying. Teachers also think it's a big problem in classrooms. As parents, it's important to know what theyr kids are doing online and use cybersecurity to keep them safe. A lot of people think only boys bully, but that's not true. Both boys and girls can be victims and bullies. Boys are more likely to get cyberbullied while gaming, and girls are more likely to experience it on social media.
The Victims should ignore the attacks, report the situation to an adult, and block the bully from social media and email accounts. Observers should also report problems to friends, family, or teachers. Blocking the bully actually prevents them from connecting to the victim's profile.
“Many teens see cyberbullying as a problem, but they see that schools, government and social media aren't doing enough to adress it, leavving them without support. So in this case is important to to ask a psychologist or parents for help
In some really sad cases of cyberbullying, bullies made fake profiles of the victims on Facebook and said mean things. So, it's important for you to be careful online. Don't share too many personal photos or info. Each of us must create a strong passwords and change them regularly. There are internet security tools that can help you to keep safe online.
It's important to stand together and look for long-lasting solutions to cyberbullying because cyberbullying carries a number of different legal implications, including intimidation, extortion, identity theft, and defamatory libel. As a result, it's important to understand your rights .
When a person finds themseves in a cyberbullying situation, it is important to collect evidence such as screenshots or photos of messages received. Also note down the date, time and other useful information. Bring everything to the police. Cyberbullying can be considered a serious crime.
Malware means malicious software. One of the most common cyber threats, malware is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer.
(structured language query) is a type of cyber-attack used to take control of and steal data from a database.
Phishing is when cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information. Phishing attacks are often used to dupe people into handing over credit card data and other personal information