Cyber Security For Students
Cyber Security For Students
DO's
&
+
DON'Ts
For Students
Development Committee
Chairperson:
Member Coordinator:
Members:
DO’s @
DO’s
DO’s
11. Make privacy settings in social media accounts such that profile
and posts are visible only to close friends and acquaintances.
12. Connect only with known individuals.
13. Be mindful of your digital reputation -- think twice before you
post something embarrassing, harmful or inappropriate.
14. Report to the service provider immediately if the account is
hacked. If possible deactivate your account.
DON’Ts
13. Don't log in as someone else to read their emails or mess with
their online profiles.
14. Don't attempt to infect or in any way try to make someone
else‛s computer unusable.
15. Meet people you've known through online alone; inform an adult
or a friend.
16. Don't open or download any attachments from an unknown
source as they may contain viruses.
Modification Destruction Curiosity Money Pornography Slander False Websites Insults Teasing Name Calling Sexual
Accusations Activities
Unauthorised Libel Lies Rumors Threats
Revenge Fake
Access IM Threats
Account including Grooming
committed
Defamation E-mails
Disruption from Attention through
for is
Identity Cyber Repeated Online
Disclosure Information & Cyber Bullying Harassments
Fun Theft Stalking Harassment Groups Online
Devices Phone
Predators
Use/Misuse
Theft Social
Share Cyber Crime include uses
Website Spyware Engineering
Changed should be Spam Piracy
do not from E-Mail Defacement Virus
Morphing Scareware
save Bombing
Securely Password Websites
MAJOR THREATS Malware
PROTECTING include Spoofing
Hoax Ransomware
shoud use
Strong Hacking
be means Scam
Firewall CYBER Worms E-mail
SAFE PRACTICE Trojans Spoofing
Password Phishing
protect use SECURITY Adware
for Latest through
Software update Copyright obtaining
legal Browser Click
Content in using Violation Before
backup Desktop/ Sensitive jacking
Filtering Discarding Authorised
Laptop Information
Data Friendship
Cyber WiFi use Store
no to use format
use & Laws in avoid with Phone Tab
Pirated update secure download Call Napping
Mobile
Software use current/ Internet update Browser Unknown app from
Antivirus E-mail use Devices
updated Pluggins People Online
Tracer access Instant
use like
Operating any never only
regular/ any check do not Messaging
System visit Untrusted
automatic avoid accept Auto
Social Media Threats Website Lock
Scan Call from Password
avoid URL Meeting record
inform do not Weired Number
do not share beware of in Person Authorised
open avoid
Strangers switch on WiFi
Parents clean and do not User Name
use do not
Personal ensure E-mail Referral
approach Spy Camera IMEI
Informtion Attachments Links Call back
from only Number Credit Card
save
Be Scared Details
instead
Privacy Security User to be Cyber browser’s Unknown When
Options Options Old Enough Police Chat Screen cookies and cache Persons Type the URL Bluetooth Needed CC:BY:SA-M.U.Paily
epathshala.gov.in, epathshala.nic.in