Page 46 - Trackpad_ipro 4.1_Class7
P. 46
The examples of cyberbullying are:
Emotionally hurting others by making fun of them on a public platform.
Sending inappropriate e-mail or text messages to insult or harass others.
Posting photos of others on public websites or social media without their consent.
Sending threatening messages and blackmailing individuals.
Measures to Stop Cyberbullying
To protect yourself from becoming a victim of cyberbullying, you can take the following measures:
Be cautious when sharing private information online, as it can be accessed by people with
malicious intentions.
Avoid disclosing personal details like your address, phone number, or school name to unknown
individuals online.
Be careful about what you share and who you share it with, especially on social media.
Regularly review and update your privacy settings on social networking sites to control who
can see your posts.
Speak up against cyberbullying and seek help from trusted adults, such as parents, teachers,
or school counsellors.
Phishing
Phishing is a cybercrime where an email, falsely claiming to be from a trusted organisation, is
sent to a user. This email usually contains a link to a fraudulent website. When users click the
link, they are prompted to enter sensitive information such as credit card details, passwords, and
usernames. This fraudulent activity can lead to significant financial loss and theft of personal
confidential information.
Measures to Avoid Phishing
Some of the measures that we can take to avoid phishing are as follows:
Be cautious of emails from unknown senders, especially those asking for personal details.
While doing online transactions, look for a lock icon sign at the address bar of the browser
window that states that the site is secure.
Protect your computer with a Firewall, Anti-virus, and Anti-Spyware Software.
Hacking
Hacking refers to unauthorised attempts to access a computer system to either destroy it or steal
important data. Hackers are individuals who breach computer systems for malicious purposes.
Measures to Avoid Hacking
To protect your computer and Internet connection from unauthorised access, follow these
practices:
Set strong, unique passwords for your Wi-Fi network and devices, and change them regularly.
Keep your operating system and software updated to defend against security vulnerabilities.
Avoid connecting unfamiliar devices (like USBs) to your computer.
44 iPro (Ver. 4.1)-VII

