Mohammad Azimuddin Amin XI – E The Asian School, Bahrain Cyber Safety: Protecting Yourself Online Understanding the importance of staying safe in the Digital World
Contents Introduction to Cyber Safety Common Cyber threats Recognizing and reporting cyber threats Cyber safety for mobile devices Practices to stay safe online Protecting personal information Safe Online Communication Safe online shopping The role of parents and educators Emerging cyber safety trends The impact of cyber attacks Understanding social engineering Protecting children online Data Backup and Recovery Conclusion
Introduction to Cyber Safety What is Cyber Safety? Protecting personal information online. Understanding and mitigating risks associated with internet usage. Why is cyber safety important? Increasing Online threats ( eg. Cyberbullying, hacking, identity theft) Growing dependence on digital platforms for communication, work and education.
Common Cyber Threats 1. Phishing Scams Deceptive emails or messages designed to steal personal information. 2. Malware Software intended to damage or disable computers (e.g., viruses, ransomware). 3. Identity Theft Stealing someone's personal information to commit fraud. 4. Cyberbullying Online harassment or bullying through social media or other platforms.
Recognizing and Reporting Cyber Threats 1. Signs of a Phishing Attempt Poor grammar, urgent requests, or suspicious email addresses. 2. What to Do if You’re Targeted Report the incident to the platform or service provider. Change passwords and monitor accounts for unusual activity. 3. Reporting to Authorities Contact local law enforcement or cybercrime units if necessary.
Cyber Safety for mobile devices 1. Keeping Your Device Secure Use strong passwords and enable biometric security features like fingerprint or facial recognition. 2. Downloading Apps Safely Only download apps from official app stores (e.g., Google Play, Apple App Store). 3. Managing Permissions Review and limit app permissions to protect your privacy. 4. Avoiding Public Wi-Fi Use mobile data or a VPN when accessing sensitive information on your mobile device.
Best Practices for Staying Safe Online 1. Use Strong Passwords Create complex passwords with a mix of letters, numbers, and symbols. Change passwords regularly. 2. Enable Two-Factor Authentication (2FA) Adds an extra layer of security beyond just a password. 3. Be Cautious with Links and Attachments Avoid clicking on suspicious links or downloading attachments from unknown sources. 4. Keep Software Updated Regularly update operating systems, browsers, and antivirus software to protect against vulnerabilities.
Protecting Your Personal Information 1. Limit Sharing on Social Media Avoid sharing sensitive information like your address, phone number, or location. 2. Use Privacy Settings Adjust settings on social media platforms to control who can see your information. 3. Be Mindful of Public Wi-Fi Avoid accessing sensitive accounts over public Wi-Fi; use a VPN if necessary.
Safe online communication 1. Be Respectful and Responsible Treat others online with the same respect you would in person. 2. Recognize and Avoid Cyberbullying Stand against cyberbullying and support those who are affected. 3. Know When to Disconnect Take breaks from online interactions if they become overwhelming.
Safe online shopping 1. Choose Trusted Websites Shop from well-known and reputable online retailers. 2. Use Secure Payment Methods Opt for credit cards or payment services like PayPal for added security. 3. Monitor Your Accounts Regularly check your bank and credit card statements for any unauthorized transactions. 4. Beware of Deals That Are Too Good to Be True Scammers often lure victims with unbelievable discounts to steal their payment information.
THE ROLE OF PARENTS AND EDUCATORS 1. Educating Children and Teens Teach the importance of cyber safety from a young age. 2. Monitoring Online Activity Use parental controls and discuss online behavior regularly. 3. Encouraging Open Communication Create a safe space for children to discuss any online concerns or threats.
Emerging Cyber Safety Trends 1. Artificial Intelligence in Cybersecurity How AI is used to detect and prevent cyber threats. 2. The Rise of Cyber Insurance Insurance policies that cover cyber-related incidents. 3. Increased Focus on Data Privacy New regulations and the importance of protecting personal data.
THE IMPACT OF CYBER ATTACKS 1. Financial Losses Costly damages from identity theft, fraud, and ransomware attacks. 2. Personal Privacy Breaches Exposure of sensitive personal data leading to privacy violations. 3. Reputational Damage Harm to personal or corporate reputation due to data breaches or cyber incidents. 4. Psychological Effects Stress, anxiety, and fear resulting from cyberbullying or identity theft.
1. What is Social Engineering? Manipulative techniques used by cybercriminals to trick individuals into revealing confidential information. 2. Common Social Engineering Tactics Pretexting: Pretending to be someone trustworthy to extract information. Baiting: Offering something enticing (e.g., free downloads) to lure victims into providing information or installing malware. Tailgating: Physically following someone into a restricted area to gain unauthorized access. 3. How to Protect Yourself Be skeptical of unsolicited requests for personal information. Verify the identity of the person requesting information. Educate yourself on common social engineering tactics. Understanding Social Engineering
! 1. Monitoring Online Activity Set up parental controls to monitor and restrict internet usage. 2. Educating About Online Risks Teach children about the dangers of sharing personal information and interacting with strangers online. Protecting Children Online 3. Encouraging Open Communication Foster a supportive environment where children feel comfortable reporting any uncomfortable online experiences. 4. Setting Screen Time Limits Help children balance their online and offline lives by setting reasonable screen time limits.
Data backup and recovery 1. Importance of Regular Backups Protects against data loss from cyber attacks, hardware failures, or accidental deletions. 2. Types of Data Backup Cloud Backup: Storing data in a remote server accessible via the internet. Local Backup: Storing data on external hard drives or other physical media. 3. Creating a Backup Schedule Regularly schedule backups (e.g., daily, weekly) depending on how often your data changes. 4. Testing Your Backup Periodically test your backup to ensure data can be restored successfully.
CONCLUSION Cyber Safety is Everyone’s Responsibility Stay Informed : Continuously educate yourself about the latest cyber threats and protection strategies. Be Proactive : Implement strong security practices, both personally and professionally, to safeguard your digital presence. Protect What Matters : Prioritize the safety of your personal information, finances, and well-being online. Spread Awareness : Share your knowledge with others to create a safer online community.
THANK YOU In an increasingly digital world, practicing cyber safety is not just important—it’s essential. Together, we can create a more secure and responsible online environment.