click below
click below
Normal Size Small Size show me how
Cyber Safety
| add | Answer |
|---|---|
| Privacy | Broadly speaking, privacy is the right to be let alone, or freedom from interference or intrusion |
| Password | a secret word or phrase that must be used to gain admission to something |
| What is a predator | a person who is attracted to children like a addiction |
| What is a scam? | scams are misleading plans designed to trick people out of their money, personal information, and other valuable resources. |
| what are shopping addiction signs ? | buying things you don't need, hiding purchases , using shopping as a way to cope with stress or emotions |
| unsafe password | An unsafe password, also known as a weak password, is one that is easily guessed that making put you're information in danger |
| cyber bullying | the use of electronic communication to bully a person typically by sending messages of an intimidating or threatening nature. |
| how to prevent cyber bullying | turn off phone , computers, and other contact that relate to the source of the bullying and tell a trusted adult |
| what does cyber bullying lead to | cyber bullying could lead to someone hurting them selves or in some cases killing them selves, it could also lead to anxiety, and nervousness |
| why do people cyber bully | some people fee more powerful behind the screen to make them selves feel better. |
| how many people died from cyber bullying so far | nearly 42% of kids have died from cyber bullying so far. |
| why do some people tolerate cyber bullying | some may hesitate because they don't know who is doing the bullying 100%. |
| predator | a pedo is a person who is sexually attracted to little kids a pedophile some pedophiles target 15 and 14 year old girls and they try to groom them into having sexual relations and inappropriate actions and sometimes they kidnapp them and sell them in a b |
| Digital footprint | A trail f data created by a persons online activity |
| How can your digital footprint affect you? | It can affect you trying to get a job, or trying to get into a college because they look at your social media |
| what are some examples of a digital footprint? | Some examples are your post, the emails you send and browsing history |
| What are some risks of a digital footprint? | Identity theft, and it can mess up your reputation |
| What is data privacy in relation to digital footprints? | Data privacy refers to the measures taken to protect information collected and stored online. |
| How can you avoid digital footprint? | You can avoid digital footprint by focusing on limiting the information you usually share or post online, or by making your accounts private. |
| Why is it important to manage your footprint? | for protecting your privacy, reputation, and future opportunities, as it can impact your job prospects and online relationships |
| How long does digital footprint usually take? | Digital footprints can last indefinitely, even if you delete information or close accounts, as data may be stored by various websites and services. |
| How can I see my digital footprint? | Search for your name or related keywords on search engines to see what information is publicly available about you. |
| Who can see my digital footprint? | Anyone with internet access can potentially see publicly available information associated with your digital footprint. |
| common emotional triggers for shopping addiction | stress, anxiety,depression and low self esteem |
| what are signs of shopping addiction? | buying things you don't need , feeling guilty after shopping, and hiding purchases from others. |
| Phishing | phishing is a scam to steal personal info by pretending to be a trusted source |
| Tech Support | Fraudsters pose as tech support agents claiming there's a problem with your computer and requesting payment to fix it |
| Online Shopping Scams | Fake online store or listing trick people into paying for goods that are never delivered |
| clone Phlishing | attacker create a nearly identical copy of a legitimate email that the victim has previously received but with malicious links or attachments |
| What is cyberbullying? | A form of bullying that occurs online, through social media, text messages emails and other digital platforms. |
| What are the effects of cyberbullying? | The effects of cyber bullying are depression, anxiety, having no confidence, and they might start to isolate themselves. |
| How to prevent cyberbullying? | Block the bully and don't put too much personal information on your social medias. |
| What to do if you witness cyberbullying | Report it to the school and they will handle it. |
| What are some resources for victims of cyberbullying | Stop bullying.gov is a website Victims of cyberbullying can use. |
| How to avoid scams? | Don't click on links or emails, don't trust caller id, and never share information online. |
| What are the different types of phishing attacks? | Email phishing, spear phishing, whaling, and vishing. |
| where predators end up | they can end up in jail or can get house arrest depends on where they are |
| predator how they usually text | they meet girls in games like Roblox and they tell them they are the same age and ask them to meet up |
| what do predators do to the kids | usually if the can get to they will ask for pictures and videos if a girl meets them up they would make them do sexual relations |
| punishment for predators | if a pedo gets caught they could get 10 to life |
| what are the causes of cyber bullying | lack of empathy desire of power and control revenge and peer pressure |