Want to create interactive content? It’s easy in Genially!
Spring dossier
MINASCURTA ARIADNA
Created on February 9, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
PRESENTATION
Start
Index
4.) consequences
1.) definition
5.) counter measures
2.) characteristics
- CYBERSECURITY
3) why bully?
01
What is cyperbullying ?
Origin of the word
Definition
The term "bullying" comes from the English "bully", which means "thug" or "bully". ( in italiano: ,,teppista" o ,,prepotente" )
Cyberbullying is bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms and mobile phones. It is repeated behaviour, aimed at scaring, angering or shaming those who are targeted.
+ info
Home
02
1.)Persistent
2.) Hard to detect.
HOW CAN IT BE?
3.) Anonymous
5.) Easier to be hurtful.
4.) Shared to a potentially larger audience.
6.) Permanent.
Home
WHY BULLY?
The reasons behind bullying are difficult to identify and often have a deep origin: the reasons why young people bully are:
- to feel powerful and in control of the situation and establish social dominance
- to deal with feelings of anger or fear
- to accommodate peer pressure
- because they have little social skills and self-control skills
- because they have themselves been victims of bullying or violence
- to address self-esteem and confidence issues
Home
quence
Conse
Cyberbullying has many negative effects, some of them can lead to serious mental health problems. People who are victims of cyberbullying are twice as likely to experience suicidal thoughts, actions or behaviors and to commit acts of self-harm than those who are not
- Depression
- Anxiety
- Sleep disturbance
- Violent behaviors
- Inability to feel safe
- High levels of strees
- Feelings of loneliness and isolation
- Stomach pain and digestiv issues
- Feelings of powerlessness and hopelessness
Home
KEEP EVERYTHING
DON'T ENGAGE
TELL SOMEONE
COUNTER MEASURES
KEEP DATA SECURE
DON'T GET TURNED AROUND
STAND TOGETHER
Like physical bullying, there are a number of measures that you can take (as an adult or a minor) to prevent cyberbullying from continuing.
LEARNE MORE
Home
Cyber security
What is it?
Cybersecurity is the practice of protecting systems, networks and programs from digital attacks. These cyber attacks are usually aimed at accessing, transforming or destroying sensitive information.
Next
Information security protects the integrity and privacy of data, both in storage and in transit.
· Operational security includes the processes and decisions for handling and protecting data assets.
Th e categories
The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.
· Network security is the practice of securing a computer network from intruders
· Application security focuses on keeping software and devices free of threats.
Next
Types of cyber threats
1.) Malware
2.) Phishing
3.) SQL injection An SQL
The threats countered by cyber-security are three-fold:
Next
1.) Use anti-virus software
Cyber safety tips
2.) Use strong passwords
3.) Update your software and operating system:
4.) Avoid using unsecure WiFi networks in public places
- protect yourself against cyberattacks
5.) Do not click on links in emails from unknown senders or unfamiliar websites
How can businesses and individuals guard against cyber threats? There are some examples:
6.) Do not open email attachments from unknown senders
LUCHETTI ANGELA ASSADI AYA MINASCURTA ARIADNA 3ASIA
For example the parents must ensure that they educate theyr children about being respectful of other people's feelings and privacy online. Explain to them very clearly how they should react online and how they should behave in general.
According to enough.org, almost half of young people aged 13 to 17 have experienced cyberbullying. Teachers also think it's a big problem in classrooms. As parents, it's important to know what theyr kids are doing online and use cybersecurity to keep them safe. A lot of people think only boys bully, but that's not true. Both boys and girls can be victims and bullies. Boys are more likely to get cyberbullied while gaming, and girls are more likely to experience it on social media.
The Victims should ignore the attacks, report the situation to an adult, and block the bully from social media and email accounts. Observers should also report problems to friends, family, or teachers. Blocking the bully actually prevents them from connecting to the victim's profile.
“Many teens see cyberbullying as a problem, but they see that schools, government and social media aren't doing enough to adress it, leavving them without support. So in this case is important to to ask a psychologist or parents for help
In some really sad cases of cyberbullying, bullies made fake profiles of the victims on Facebook and said mean things. So, it's important for you to be careful online. Don't share too many personal photos or info. Each of us must create a strong passwords and change them regularly. There are internet security tools that can help you to keep safe online.
It's important to stand together and look for long-lasting solutions to cyberbullying because cyberbullying carries a number of different legal implications, including intimidation, extortion, identity theft, and defamatory libel. As a result, it's important to understand your rights .
When a person finds themseves in a cyberbullying situation, it is important to collect evidence such as screenshots or photos of messages received. Also note down the date, time and other useful information. Bring everything to the police. Cyberbullying can be considered a serious crime.
Malware means malicious software. One of the most common cyber threats, malware is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer.
(structured language query) is a type of cyber-attack used to take control of and steal data from a database.
Phishing is when cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information. Phishing attacks are often used to dupe people into handing over credit card data and other personal information