Warning: No part of this site may be reproduced, stored in a retrieval system or transmitted in any form without the prior permission of the website owner is strictly prohibited.

Handbook for Students Adolescents on Cyber Safety

Handbook for Students Adolescents on Cyber Safety

Information and communication technology has become an integral part of our day-to-day life. It has just transformed the way we communicate, make friends, share updates, play games, and do shopping and so on. The technology has impacted most aspects of our day-to-day life. Our new generation is getting exposure to cyber space at a very young age. More and more children invest time online to play games, make friends, and use social networking sites and so on. In fact with smart phones access to social networking, online games, shopping, etc. has increased significantly. The cyber space connects us virtually with crores of online users from across the globe. With increasing use of cyber space, cyber crimes are also increasing rapidly. Children are highly vulnerable as they are exposed to cyber space with limited understanding of cyber threats and safeguards. Children are in experimental age group. They like to experiment, learn new things and use new technologies. While experimenting is a good way to learn, it is equally important that proper guidance is provided to children so that they can protect themselves from adverse impact of cyber technology. This handbook is for children above 13 years of age. It can be used by younger students as well to understand the cyber world.
better and prepare themselves to be responsible and careful cyber citizens of future. The purpose of this handbook is to provide an overview of various cyber threats that can impact children and discuss safeguards that can help in preventing the cybercrimes. The first and second chapters of the handbook provides an insight to children on why cyber security is a concern and what are different types of cybercrimes that can impact us.The third chapter of the handbook talks about cyberbullying and how it can impact children. It further details out the key safeguards that may help children to protect themselves against cyberbullying and ways to deal with cyberbullying. The fourth chapter of the handbook covers cyber grooming and its impact on the children. It also provides details about various safeguards that can be adopted by children to protect themselves from cyber grooming. The fifth  chapter talks about cyber threats related to online gaming and safety tips that can help children in safeguarding themselves against such cyber threats. Emails are used commonly by cybercriminals. The sixth chapter provides an overview of how cybercriminals can trigger cybercrimes using emails and safety tips that may help children in using emails securely. Cyber technology has also transformed the way we do financial transactions. More and more people are using online platforms for shopping, transferring money and other financial transactions. Moreover, efforts are being made to facilitate financial education in schools in order to make students ready for future. In view of increasing cybercrimes related to financial frauds. chapter seventh of the handbook provides an overview to children on cyber threats related to online financial transactions and how to safeguard ourselves against such threats. The last chapter of the handbook covers cyber threats related to social networking and how to safeguards against such threats. The handbook shall help students to learn about cyber threats and ways how they can protect themselves. As a change agent, students are expected to share their learning with their peers and parents and contribute in making cyber space safer. 
Cyber criminals want to get unauthorized access to our sensitive information In majority of cases, the cyber criminals would advent an attac k with a clear cut objective, for that they use some of the most effective methods. 
Some common ways used by cyber criminals are: Email Spoofing: Sending out e-mails to you that look like genuine and from a trusted e-mail ID but actually, they're not. 
Malicious Files Applications: Sending you malicious and bad applications and files through direct messaging, gaming, mails or websites etc. in order to get access to your smart phone and personal data. Social Engineering: Social Engineering is a technique used by cybercriminals to gain your confidence to get information from you. Depending on what you like to do most, a cybercriminal may try to interact with you to mine for information and/or commit some harm to you. Suppose you like to play an online game, an impersonator behaves like another child and invites you to talk to him and share information. 
Cyber Bullying: A form of harassment or bullying inflicted through the use of electronic or communication devices such as computer, mobile phone, laptop, etc. 
Identity Theft: Deliberate use of someone's identity to gain financial advantage or to obtain credit and other benefits in the other person's name/ for counterparts disadvantage or loss. 
Job Frauds: Fraudulent representation or a deceptive activity on the part of an employee or a prospective employee toward an employer. 
Banking Frauds: Fraudulently obtaining money from depositors by posing as a bank or other financial institution. 

Handbook for Students Adolescents on Cyber Safety,cyber safety hand book,cyber safety instructions,internet safety instructions,cyber safety hand book for students,cyber safety instructions for students,internet safety instructions for students,cyber safety ppt,cyber safety class 9,cyber safety for kids,cyber safety definition,cyber safety information,cyber safety rules,cyber safety article,cyber safety awareness,cyber safety and security ppt,cyber safety awareness ppt,cyber safety articles for students,cyber safety and security concerns,cyber safety advantages and disadvantages,what is a cyber safety,a speech on cyber safety,a definition of cyber safety,cyber safety background,cyber safety basics ppt,cyber safety do's and don'ts,cyber safety documentary,cyber safety examples,cyber safety expert india
Previous
Next Post »
0 Komentar