Mohammad Azimuddin Amin
XI – E
The Asian School, Bahrain
Cyber Safety:
Protecting
Yourself Online
Understanding the
importance of staying safe in
the Digital World
Contents
i. Introduction to Cyber Safety
ii. Common Cyber threats
iii. Recognizing and reporting cyber
threats
iv. Cyber safety for mobile devices
v. Practices to stay safe online
vi. Protecting personal information
vii. Safe Online Communication
viii.Safe online shopping
ix. The role of parents and
educators
x. Emerging cyber safety trends
xi. The impact of cyber attacks
xii. Understanding social
engineering
xiii.Protecting children online
xiv.Data Backup and Recovery
xv. Conclusion
Introduction to Cyber Safety
What is Cyber Safety?
 Protecting personal information
online.
 Understanding and mitigating
risks associated with internet
usage.
Why is cyber safety important?
 Increasing Online threats (eg.
Cyberbullying, hacking, identity
theft)
 Growing dependence on digital
platforms for communication,
work and education.
Common Cyber Threats
1. Phishing Scams
• Deceptive emails or messages
designed to steal personal
information.
2. Malware
• Software intended to damage or
disable computers (e.g., viruses,
ransomware).
3. Identity Theft
• Stealing someone's personal
information to commit fraud.
4. Cyberbullying
• Online harassment or bullying
through social media or other
platforms.
Recognizing and Reporting Cyber Threats
1. Signs of a Phishing Attempt
• Poor grammar, urgent requests, or
suspicious email addresses.
2. What to Do if You’re Targeted
• Report the incident to the platform or
service provider.
•Change passwords and monitor
accounts for unusual activity.
3. Reporting to Authorities
• Contact local law enforcement or
cybercrime units if necessary.
Cyber Safety for mobile devices
1. Keeping Your Device Secure
• Use strong passwords and enable biometric
security features like fingerprint or facial
recognition.
2. Downloading Apps Safely
• Only download apps from official app stores
(e.g., Google Play, Apple App Store).
3. Managing Permissions
• Review and limit app permissions to protect
your privacy.
4. Avoiding Public Wi-Fi
• Use mobile data or a VPN when accessing
sensitive information on your mobile device.
Best Practices for Staying
Safe Online
1. Use Strong Passwords
• Create complex passwords with a mix of letters,
numbers, and symbols.
• Change passwords regularly.
2. Enable Two-Factor Authentication (2FA)
• Adds an extra layer of security beyond just a
password.
3. Be Cautious with Links and Attachments
• Avoid clicking on suspicious links or downloading
attachments from unknown sources.
4. Keep Software Updated
• Regularly update operating systems, browsers,
Protecting Your Personal
Information
1. Limit Sharing on Social Media
• Avoid sharing sensitive information like your address, phone
number, or location.
2. Use Privacy Settings
• Adjust settings on social media platforms to control who can
see your information.
3. Be Mindful of Public Wi-Fi
• Avoid accessing sensitive accounts over public Wi-Fi; use a VPN
if necessary.
Safe online communication
1. Be Respectful and Responsible
• Treat others online with the same
respect you would in person.
2. Recognize and Avoid
Cyberbullying
• Stand against cyberbullying and
support those who are affected.
3. Know When to Disconnect
• Take breaks from online interactions
if they become overwhelming.
Safe online shopping
1. Choose Trusted Websites
• Shop from well-known and reputable online
retailers.
2. Use Secure Payment Methods
• Opt for credit cards or payment services like
PayPal for added security.
3. Monitor Your Accounts
• Regularly check your bank and credit card
statements for any unauthorized transactions.
4. Beware of Deals That Are Too Good to Be
True
• Scammers often lure victims with unbelievable
THE ROLE OF PARENTS AND EDUCATORS
1. Educating Children and Teens
• Teach the importance of cyber safety from a
young age.
2. Monitoring Online Activity
• Use parental controls and discuss online
behavior regularly.
3. Encouraging Open Communication
•Create a safe space for children to discuss any
online concerns or threats.
Emerging Cyber Safety
Trends
1. Artificial Intelligence in
Cybersecurity
• How AI is used to detect and prevent
cyber threats.
2. The Rise of Cyber Insurance
• Insurance policies that cover cyber-
related incidents.
3. Increased Focus on Data Privacy
• New regulations and the importance of
protecting personal data.
THE IMPACT OF CYBER
ATTACKS
1. Financial Losses
• Costly damages from identity theft,
fraud, and ransomware attacks.
2. Personal Privacy Breaches
• Exposure of sensitive personal data
leading to privacy violations.
3. Reputational Damage
• Harm to personal or corporate
reputation due to data breaches or cyber
incidents.
4. Psychological Effects
• Stress, anxiety, and fear resulting from
cyberbullying or identity theft.
1. What is Social Engineering?
• Manipulative techniques used by cybercriminals to trick
individuals into revealing confidential information.
2. Common Social Engineering Tactics
• Pretexting: Pretending to be someone trustworthy to extract
information.
• Baiting: Offering something enticing (e.g., free downloads) to
lure victims into providing information or installing malware.
• Tailgating: Physically following someone into a restricted area
to gain unauthorized access.
3. How to Protect Yourself
• Be skeptical of unsolicited requests for personal information.
• Verify the identity of the person requesting information.
• Educate yourself on common social engineering tactics.
Understanding Social Engineering
!
1. Monitoring Online Activity
•Set up parental controls to monitor
and restrict internet usage.
2. Educating About Online Risks
•Teach children about the dangers of
sharing personal information and
interacting with strangers online.
Protecting
Children Online
3. Encouraging Open
Communication
•Foster a supportive environment
where children feel comfortable
reporting any uncomfortable online
experiences.
4. Setting Screen Time Limits
•Help children balance their online
Data backup and recovery
1. Importance of Regular Backups
•Protects against data loss from cyber attacks,
hardware failures, or accidental deletions.
2. Types of Data Backup
•Cloud Backup: Storing data in a remote server
accessible via the internet.
•Local Backup: Storing data on external hard
drives or other physical media.
3. Creating a Backup Schedule
•Regularly schedule backups (e.g., daily, weekly)
depending on how often your data changes.
4. Testing Your Backup
•Periodically test your backup to ensure data can
be restored successfully.
CONCLUSION
Cyber Safety is Everyone’s Responsibility
• Stay Informed: Continuously educate yourself about the
latest cyber threats and protection strategies.
• Be Proactive: Implement strong security practices, both
personally and professionally, to safeguard your digital
presence.
• Protect What Matters: Prioritize the safety of your personal
information, finances, and well-being online.
• Spread Awareness: Share your knowledge with others to
create a safer online community.
THANK YOU
In an increasingly digital world, practicing cyber safety is not just important—it’s essential.
Together, we can create a more secure and responsible online environment.

More Related Content

PPT
Computer Security and safety
PPTX
Cyber security
PPTX
Digital_Cyber-Literacy-Group-2 Reporting.pptx
PDF
Module 5: Safety
PPTX
COMPUTER ETHICS.pptx
PPTX
digital / cyber powerpoint presentation with examples
PPTX
PCK-6-MODULE-9.pptx Digital/ Cyber Literacy
PPTX
empowerment technologies Powerpoint presentation
Computer Security and safety
Cyber security
Digital_Cyber-Literacy-Group-2 Reporting.pptx
Module 5: Safety
COMPUTER ETHICS.pptx
digital / cyber powerpoint presentation with examples
PCK-6-MODULE-9.pptx Digital/ Cyber Literacy
empowerment technologies Powerpoint presentation

Similar to Cyber Safety.pptx cause its the best lol (20)

PPTX
Cyber Literacy PowerPoints Presentations
PPTX
CyberFirst-Navigators-Lesson-1-presentation.pptx
PPTX
CyberFirst-Navigators-Lesson-1-presentation.pptx
PPTX
Cyber Security PPT.| Present your cyber security
PPS
Microsoft (Projects)
PPTX
Cyber Security and Safety in Schools and Educational Institution
PDF
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
PPTX
Cyber_Awareness_Presrerereerentation.pptx
PPTX
CyberFirst-Navigators-Lesson-1-presentation.pptx
PPTX
Module-9. DIGITAL.CYBER-LITERACY.pptx
PPTX
INTERNET SAFER DAY-2021.pptx
PPTX
1.2 Best Practices of Cyber Security sbk.pptx
PPTX
NCSC-Cyber-security-training-for-school-staff.pptx
PPT
Responsible Digital Citizensip in the 21st Century.ppt
PPTX
Security Awareness Training.pptx
PPTX
ICT online tools & Internet Safety
PPTX
Introduction to cybersecurity and digital nettiquette
PPTX
Group 1.pptx for the topic cyber security
PPTX
Cybersecurity-Awareness-Presentation-17-May-22.pptx
PPTX
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cyber Literacy PowerPoints Presentations
CyberFirst-Navigators-Lesson-1-presentation.pptx
CyberFirst-Navigators-Lesson-1-presentation.pptx
Cyber Security PPT.| Present your cyber security
Microsoft (Projects)
Cyber Security and Safety in Schools and Educational Institution
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Cyber_Awareness_Presrerereerentation.pptx
CyberFirst-Navigators-Lesson-1-presentation.pptx
Module-9. DIGITAL.CYBER-LITERACY.pptx
INTERNET SAFER DAY-2021.pptx
1.2 Best Practices of Cyber Security sbk.pptx
NCSC-Cyber-security-training-for-school-staff.pptx
Responsible Digital Citizensip in the 21st Century.ppt
Security Awareness Training.pptx
ICT online tools & Internet Safety
Introduction to cybersecurity and digital nettiquette
Group 1.pptx for the topic cyber security
Cybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Ad

Recently uploaded (20)

PDF
Social Media Trends in 2025 Changing the Digital Era
PDF
Mastering the Digital Game: Marketing That Converts"
PDF
AI SOCIAL MEDIA AUDIT BY GLADYS ISRAEL .
PDF
The 27 Archetypes of Conscious Content Consumers
PDF
Unlock Success with the Best Digital Marketing Services
PDF
What is TikTok Cyberbullying? 15 Smart Ways to Prevent It
PPTX
Promote Your Business Through Facebook Ads
PDF
Top 5 Marketing Strategies Retailers Spend Half Their Annual Budget On
PDF
Dark Social Tracking Without Creeping People Out (1).pdf
PPTX
Social Media Plan untuk kebutuhan campaign.pptx
PPTX
Lesson 1- PROF ELECT II tourismmmmmmmmmm
PDF
From Viral to Vanishing_ How to Maintain Momentum on TikTok
PDF
GOM Player Plus 2.3.93.5364 Crack latest version
PDF
Fulfillment Of The Right To Health As A Human Right (HAM) In The Integration ...
PPTX
Topaz Gigapixel AI Crack Latest Version [2025]
PPTX
Deployment Experiences with Amrita Kripa: A User-Friendly Feature Rich Crowds...
PDF
Machine Learning-Driven Credit Portfolio Optimization: Balancing Risk, Return...
PDF
Professional Development on Teachers’ Performance: Its Ability to Address Div...
PDF
AI-Driven Social Media Marketing | Top Social Media Marketing Agency & Strate...
PPTX
Beyond Compare 5.1.4 Build 31268 Crack For Window
Social Media Trends in 2025 Changing the Digital Era
Mastering the Digital Game: Marketing That Converts"
AI SOCIAL MEDIA AUDIT BY GLADYS ISRAEL .
The 27 Archetypes of Conscious Content Consumers
Unlock Success with the Best Digital Marketing Services
What is TikTok Cyberbullying? 15 Smart Ways to Prevent It
Promote Your Business Through Facebook Ads
Top 5 Marketing Strategies Retailers Spend Half Their Annual Budget On
Dark Social Tracking Without Creeping People Out (1).pdf
Social Media Plan untuk kebutuhan campaign.pptx
Lesson 1- PROF ELECT II tourismmmmmmmmmm
From Viral to Vanishing_ How to Maintain Momentum on TikTok
GOM Player Plus 2.3.93.5364 Crack latest version
Fulfillment Of The Right To Health As A Human Right (HAM) In The Integration ...
Topaz Gigapixel AI Crack Latest Version [2025]
Deployment Experiences with Amrita Kripa: A User-Friendly Feature Rich Crowds...
Machine Learning-Driven Credit Portfolio Optimization: Balancing Risk, Return...
Professional Development on Teachers’ Performance: Its Ability to Address Div...
AI-Driven Social Media Marketing | Top Social Media Marketing Agency & Strate...
Beyond Compare 5.1.4 Build 31268 Crack For Window
Ad

Cyber Safety.pptx cause its the best lol

  • 1. Mohammad Azimuddin Amin XI – E The Asian School, Bahrain Cyber Safety: Protecting Yourself Online Understanding the importance of staying safe in the Digital World
  • 2. Contents i. Introduction to Cyber Safety ii. Common Cyber threats iii. Recognizing and reporting cyber threats iv. Cyber safety for mobile devices v. Practices to stay safe online vi. Protecting personal information vii. Safe Online Communication viii.Safe online shopping ix. The role of parents and educators x. Emerging cyber safety trends xi. The impact of cyber attacks xii. Understanding social engineering xiii.Protecting children online xiv.Data Backup and Recovery xv. Conclusion
  • 3. Introduction to Cyber Safety What is Cyber Safety?  Protecting personal information online.  Understanding and mitigating risks associated with internet usage. Why is cyber safety important?  Increasing Online threats (eg. Cyberbullying, hacking, identity theft)  Growing dependence on digital platforms for communication, work and education.
  • 4. Common Cyber Threats 1. Phishing Scams • Deceptive emails or messages designed to steal personal information. 2. Malware • Software intended to damage or disable computers (e.g., viruses, ransomware). 3. Identity Theft • Stealing someone's personal information to commit fraud. 4. Cyberbullying • Online harassment or bullying through social media or other platforms.
  • 5. Recognizing and Reporting Cyber Threats 1. Signs of a Phishing Attempt • Poor grammar, urgent requests, or suspicious email addresses. 2. What to Do if You’re Targeted • Report the incident to the platform or service provider. •Change passwords and monitor accounts for unusual activity. 3. Reporting to Authorities • Contact local law enforcement or cybercrime units if necessary.
  • 6. Cyber Safety for mobile devices 1. Keeping Your Device Secure • Use strong passwords and enable biometric security features like fingerprint or facial recognition. 2. Downloading Apps Safely • Only download apps from official app stores (e.g., Google Play, Apple App Store). 3. Managing Permissions • Review and limit app permissions to protect your privacy. 4. Avoiding Public Wi-Fi • Use mobile data or a VPN when accessing sensitive information on your mobile device.
  • 7. Best Practices for Staying Safe Online 1. Use Strong Passwords • Create complex passwords with a mix of letters, numbers, and symbols. • Change passwords regularly. 2. Enable Two-Factor Authentication (2FA) • Adds an extra layer of security beyond just a password. 3. Be Cautious with Links and Attachments • Avoid clicking on suspicious links or downloading attachments from unknown sources. 4. Keep Software Updated • Regularly update operating systems, browsers,
  • 8. Protecting Your Personal Information 1. Limit Sharing on Social Media • Avoid sharing sensitive information like your address, phone number, or location. 2. Use Privacy Settings • Adjust settings on social media platforms to control who can see your information. 3. Be Mindful of Public Wi-Fi • Avoid accessing sensitive accounts over public Wi-Fi; use a VPN if necessary.
  • 9. Safe online communication 1. Be Respectful and Responsible • Treat others online with the same respect you would in person. 2. Recognize and Avoid Cyberbullying • Stand against cyberbullying and support those who are affected. 3. Know When to Disconnect • Take breaks from online interactions if they become overwhelming.
  • 10. Safe online shopping 1. Choose Trusted Websites • Shop from well-known and reputable online retailers. 2. Use Secure Payment Methods • Opt for credit cards or payment services like PayPal for added security. 3. Monitor Your Accounts • Regularly check your bank and credit card statements for any unauthorized transactions. 4. Beware of Deals That Are Too Good to Be True • Scammers often lure victims with unbelievable
  • 11. THE ROLE OF PARENTS AND EDUCATORS 1. Educating Children and Teens • Teach the importance of cyber safety from a young age. 2. Monitoring Online Activity • Use parental controls and discuss online behavior regularly. 3. Encouraging Open Communication •Create a safe space for children to discuss any online concerns or threats.
  • 12. Emerging Cyber Safety Trends 1. Artificial Intelligence in Cybersecurity • How AI is used to detect and prevent cyber threats. 2. The Rise of Cyber Insurance • Insurance policies that cover cyber- related incidents. 3. Increased Focus on Data Privacy • New regulations and the importance of protecting personal data.
  • 13. THE IMPACT OF CYBER ATTACKS 1. Financial Losses • Costly damages from identity theft, fraud, and ransomware attacks. 2. Personal Privacy Breaches • Exposure of sensitive personal data leading to privacy violations. 3. Reputational Damage • Harm to personal or corporate reputation due to data breaches or cyber incidents. 4. Psychological Effects • Stress, anxiety, and fear resulting from cyberbullying or identity theft.
  • 14. 1. What is Social Engineering? • Manipulative techniques used by cybercriminals to trick individuals into revealing confidential information. 2. Common Social Engineering Tactics • Pretexting: Pretending to be someone trustworthy to extract information. • Baiting: Offering something enticing (e.g., free downloads) to lure victims into providing information or installing malware. • Tailgating: Physically following someone into a restricted area to gain unauthorized access. 3. How to Protect Yourself • Be skeptical of unsolicited requests for personal information. • Verify the identity of the person requesting information. • Educate yourself on common social engineering tactics. Understanding Social Engineering
  • 15. ! 1. Monitoring Online Activity •Set up parental controls to monitor and restrict internet usage. 2. Educating About Online Risks •Teach children about the dangers of sharing personal information and interacting with strangers online. Protecting Children Online 3. Encouraging Open Communication •Foster a supportive environment where children feel comfortable reporting any uncomfortable online experiences. 4. Setting Screen Time Limits •Help children balance their online
  • 16. Data backup and recovery 1. Importance of Regular Backups •Protects against data loss from cyber attacks, hardware failures, or accidental deletions. 2. Types of Data Backup •Cloud Backup: Storing data in a remote server accessible via the internet. •Local Backup: Storing data on external hard drives or other physical media. 3. Creating a Backup Schedule •Regularly schedule backups (e.g., daily, weekly) depending on how often your data changes. 4. Testing Your Backup •Periodically test your backup to ensure data can be restored successfully.
  • 17. CONCLUSION Cyber Safety is Everyone’s Responsibility • Stay Informed: Continuously educate yourself about the latest cyber threats and protection strategies. • Be Proactive: Implement strong security practices, both personally and professionally, to safeguard your digital presence. • Protect What Matters: Prioritize the safety of your personal information, finances, and well-being online. • Spread Awareness: Share your knowledge with others to create a safer online community.
  • 18. THANK YOU In an increasingly digital world, practicing cyber safety is not just important—it’s essential. Together, we can create a more secure and responsible online environment.