1 / 7

CYBER CRIME

CYBER CRIME. e-rule e-safety e-care. PREPARED BY: CA 11132 KANGESWARY A/P KUPPUSAMY KE 11058 SHOBANA A/P SINNIAH. E-RULE. E-SAFETY.  Internet threats can come in various forms or attacks. The Internet can create the illusion that strangers are actually “friends”.

agrata
Télécharger la présentation

CYBER CRIME

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CYBER CRIME e-rule e-safety e-care • PREPARED BY: • CA 11132 KANGESWARY A/P KUPPUSAMY • KE 11058 SHOBANA A/P SINNIAH

  2. E-RULE

  3. E-SAFETY •  Internet threats can come in various forms or attacks. • The Internet can create the illusion that strangers are actually “friends”. • The Internet can damage your reputation.

  4. CYBER BULLYING • Cyber BullyingCyber bullying is a form of cyber threat that embarrasses, mistreats or frightens its victim. This act is known to even cause mental and emotional disorders to victims. • If you are a victim of cyber bullying, follow these useful tips that are based on i-SAFE: 1. Continuously tell a trusted adult about the bullying, until someone takes action.2. Do not open or read messages sent by the cyber bullies.3. Tell your teacher or administrator at your school if it is school related.4. Do not erase the messages because they may be needed to take action.5. Protect yourself and never agree to meet face to face with anyone you meet online.6. If bullied via chatting or instant messaging, the “bully” can often be blocked.7. If you are threatened with harm, inform the local police.

  5. E-CAREProper Recycling and Disposing Computer Equipment

  6. REFERENCES • http://www.google.com.my/search?hl=en&sugexp=crf&cp=5&gs_id=p&xhr=t&q=e-rule&bav=on.2,or.r_gc.r_pw.r_qf.,cf.osb&biw=1280&bih=699&um=1&ie=UTF-8&tbm=isch&source=og&sa=N&tab=wi&ei=GNOiT6fwJ4LUrQfj-Nm_Bw#um=1&hl=en&tbm=isch&sa=1&q=internet+safety&oq=internet+&aq=0&aqi=g10&aql=&gs_l=img. • http://www.google.com.my/search?hl=en&sugexp=crf&cp=5&gs_id=p&xhr=t&q=e-rule&bav=on.2,or.r_gc.r_pw.r_qf.,cf.osb&biw=1280&bih=699&um=1&ie=UTF-8&tbm=isch&source=og&sa=N&tab=wi&ei=GNOiT6fwJ4LUrQfj-Nm_Bw#um=1&hl=en&tbm=isch&sa=1&q=CYBER+CRIME&oq=CYBER+CRIME&aq=f&aqi=g2g-s1g2g-s1g1g-s3&aql=&gs_l=img.3..0l2j0i10j0l2j0i10j0 • http://www.google.com.my/search?hl=en&sugexp=crf&cp=5&gs_id=p&xhr=t&q=e-rule&bav=on.2,or.r_gc.r_pw.r_qf.,cf.osb&biw=1280&bih=699&um=1&ie=UTF-8&tbm=isch&source=og&sa=N&tab=wi&ei=GNOiT6

  7. THANK YOU

More Related