1. How can people have their personal
information obtained?
Don't put any information on the internet about yourself or put your facebook page or Instagram etc on a security protected shield so know one can view your profile and know your information about you or your life.
2. What are different forms of cyber
abuse?
Harassment
Flaming
Exclusion
Outing
Masquerading
Flaming
Exclusion
Outing
Masquerading
3. What are the risks when responding to
emails?
They could be a spam or a scam email that could hack your email account or could be scammers who are trying to get your money. To pay for something that is fake.
4. What are the risks when online
gaming?
Cyber bullying
Privacy problems
Webcam worries
Personal information left on PC's
Online predators
Hidden fees
Malware
5. What are the risks when sharing files?
Privacy problems
Webcam worries
Personal information left on PC's
Online predators
Hidden fees
Malware
5. What are the risks when sharing files?
Downloading viruses, malware and spyware to your computer without you knowing it.Downloading unwanted pornography labelled as something else.
6. What are the risks when using smart
phones?
People can hack your phones and look on your facebook, snapchat and instagram etc. people could contact loved ones and send inappropriate messages and could black mail people.
7. What are the potential consequences
that may result if an individual is persuaded to send explicit images to others
via text message?
That the image could be posted on the internet and could be shared to other people, and people could actually send harmful messages to that person because of the inappropriate image.
That the image could be posted on the internet and could be shared to other people, and people could actually send harmful messages to that person because of the inappropriate image.
8. What is the impact on an individual
if someone obtains and streams on social media websites inappropriate videos or
images of the individual?
They could end up being bullied by other people and could lead to suicide.
They could end up being bullied by other people and could lead to suicide.
9. How can hackers use personal
information that has been posted onto social media websites? They could use your information for facebook etc or back accounts or could get you in prison by using your ID information.
10. How might users be tricked into disclosing
personal information when using social media websites? They could send an email saying you brought an item, which they didn't and could ask for their bank details to cancel their item.
11. What are the different grooming techniques
used by online predators? They could lie about their age and lie about who they are to get with people who vulnerable and who are younger.
12. What are the different types of exploitation
techniques that can be used by online predators? They could share inappropriate images of the person and share them on the internet to blackmail them.
Task 2
The importance of staying safe is to not post inappropriate pictures or statuses on the internet that will get you into trouble and this will give the bullies the opportunity to hurt your feelings and to make your life miserable. To stay safe you don't need to tell people who you really are and they don't need to know what you do and what you do in your spare time, you've just got to tell them you name and birthday and that's it nothing more. This will be a safe way onto hide your identity from people who want to hurt and make you feel like you want to kill yourself. The best way to keep people safe is not to have facebook, snapchat and instagram etc. So children can feel more safely and confident in this world.
Task 3
Task 3
|
Changes in
a persona behaviour that show they may be a victim of cyber abuse
|
The person would become more quite, would feel less confident and would blame their family.
|
|
What is
“Cyber Self Harm”?
|
Someone who hurts themselves or says horrible things about themselves.
|
|
Reasons a
person may anonymously troll or bull themselves online?
|
To stop other people bullying them to make them feel less uncomfortable.
|
|
Situations
when they should report others behaviour in online chat rooms
|
They should report people's behaviour to their parents, teachers or maybe even their friends that they can trust.
|
|
Situations
when they should report others behaviour in online instant messaging
|
When someone is feeling upset or depress or when people feel uncomfortable.
|
Task 4
Who do we report it to? We report this problem to our parents who are there to help their children. we report it to out teachers who will help us keep us safe and give us support and we would also report it to the police who would take action to stop this cyber attack to stop these criminals from ruining people's lives.
Task 5
Here are my top tips from keeping safe from online attacks:
- Don't post inappropriate images on the internet.
- Don't put statues up that would offend people and that would get you into trouble.
- Don't feel pressured to post images, just say no and it will show you have confidence to stand up against people.
- Report a cyber attack to anyone you can trust and stop them from hurting you.
- Don't feel as if you have to snap chat, Facebook etc. So that you can fit with other people. Just be your self and don't feel the need you have to be like everyone else the internet.