0% found this document useful (0 votes)
24 views48 pages

Cyberbully Tech Update

The document by Ts.Dr. Sheila Mahalingam focuses on cyberbullying awareness and social media ethics, emphasizing the importance of device security and safe online practices. It covers topics such as BYOD (Bring Your Own Device) security, common threats like phishing and cyberstalking, and provides tips for protecting personal information. Additionally, it addresses the legal framework surrounding cyber harassment in Malaysia.

Uploaded by

ahgilan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views48 pages

Cyberbully Tech Update

The document by Ts.Dr. Sheila Mahalingam focuses on cyberbullying awareness and social media ethics, emphasizing the importance of device security and safe online practices. It covers topics such as BYOD (Bring Your Own Device) security, common threats like phishing and cyberstalking, and provides tips for protecting personal information. Additionally, it addresses the legal framework surrounding cyber harassment in Malaysia.

Uploaded by

ahgilan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 48

MIND LIFE ACADEMY

TECH TALK & CYBERBULLYING AWARENESS


BYOD & SOCIAL MEDIA ETHICS

Ts.Dr.Sheila Mahalingam
2023

Mindlifeacademy @mindlifeacademy

www.mindlifeacademy.com

prepared by : Ts.Dr.Sheila Mahalingam


MIND LIFE ACADEMY

BYOD
BRING YOUR OWN DEVICE ?

SECURITY ISSUES ON
DEVICE

HUMAN ERROR

AWARENESS

2023 prepared by : Ts.Dr.Sheila Mahalingam


Mobile Operating System Market Share Worldwide - March 2023

Samsung
0.4%

iOS
28.5%

Android
71.2%
2023 prepared by : Ts.Dr.Sheila Mahalingam
Vishing (also known as "voice phishing")
is a social engineering ..
2023 prepared by : Ts.Dr.Sheila Mahalingam
2023 prepared by : Ts.Dr.Sheila Mahalingam
2023 prepared by : Ts.Dr.Sheila Mahalingam
MIND LIFE ACADEMY

PASSCODE , SCREEN LOCK

WIFI , BLUETOOTH , TEETHERING

WHAT YOU NEED TO DO IN OS AND ANTIVIRUS UPDATES


YOUR DEVICE ?
IMEI NUMBER , MAC ADD
2023 prepared by : Ts.Dr.Sheila Mahalingam

BACKUP CLOUD
PASSWORD , SCREEN LOCK

Tap Settings from your devices apps menu


Tap on Security (or Security and Screen Lock), this is
usually located under the Personal section
Under the Screen Security section tap Screen lock
.
2023 • Pattern - you can draw a pattern on a grid to unlock
prepared by : Ts.Dr.Sheila Mahalingam

your device
• PIN - you can enter a 4 digit code to unlock your device
• Password - you can use a password you are
comfortable with. The password must be longer than 4
characters.
Tap on Settings > Touch ID &
Passcode
2023 prepared by : Ts.Dr.Sheila Mahalingam
(or Face ID & Passcode)
tap Turn Passcode On
“1234”, “1111” or “7777”,
10,000 unique possible PINs
take 1 day to brute force this 4 digit PIN
Android devices will not delete their contents after any
number of incorrect entries.
iPhones and iPads, for instance,-- forced delay of 80 milliseconds
2023
between PIN or password attempts.
prepared by : Ts.Dr.Sheila Mahalingam

10 incorrect attempts:
time-out for increasing periods of time,
lock out completely,
potentially delete all data permanently, depending on your settings.
5-character passwords
90 different possibilities number ,
symbol, character

90*90*90*90*90=5,904,900,000
5-point pattern
2023 prepared by : Ts.Dr.Sheila Mahalingam

9*8*7*6*5=15,120
WIFI , BLUETOOTH , TEETHERING

How do I know if my Wi-Fi is WEP or WPA?

Wired Equivalent Privacy (WEP) 1997.- security passcode for Wi-Fi-enabled


devices

Wi-Fi Protected Access (WPA) - dynamic 128-bit key


2023 prepared by : Ts.Dr.Sheila Mahalingam

Wi-Fi Protected Access 2 (WPA2) - 2004 better encrpytion

Wi-Fi Protected Access 3 (WPA3) -2020 for latest version of safe wifi
security public wifi encrpytion
WIFI , BLUETOOTH , TEETHERING
Bluetooth security risks
Bluesnarfing - identity theft gain access to your photos, text
messages, emails, and more.
Bluejacking - include malware : sends unsolicited spam and
phishing messages

Bluebugging - use backdoor secret connection spy on you and access your
private data.
2023 prepared by : Ts.Dr.Sheila Mahalingam

Bluesmacking- force shutdown denial of service (DoS) attack

Car Whispering- attack to eavesdrop on conversations and phone calls that


take place inside the car
WIFI , BLUETOOTH , TEETHERING
Bluetooth security tips

Keep your Bluetooth setting in “not discoverable”


Don't share sensitive information via Bluetooth
Be careful who you connect with
Turn Bluetooth off
2023
Don't pair in public
prepared by : Ts.Dr.Sheila Mahalingam

Delete unused bluetooth


WIFI , BLUETOOTH , TEETHERING

2023 prepared by : Ts.Dr.Sheila Mahalingam


Where is antivirus in mobile?
You can also use Google Settings to scan your phone for security
threats:
Open Apps.
Tap Google Settings.
Tap Security.
Tap Verify apps.
2023
Tap Scan device for security threats.
prepared by : Ts.Dr.Sheila Mahalingam

Bitdefender Total Security. Best for Comprehensive Protection.


Norton 360 Deluxe. Best for VPN Enthusiasts. ...
McAfee AntiVirus Plus. Best for Multi-Device Households
IMEI NUMBER , MAC ADD

International Mobile Equipment Identity.

What and where is my IMEI number?


Dial *#06# from your device.
You'll see your IMEI number displayed on your screen.
2023 prepared by : Ts.Dr.Sheila Mahalingam

Where To Find IMEI Number Without Phone?


• Sign in to your Google Account.
• Open the Android Device Manager.
• The IMEI number should be displayed along with your registered Android device.
How to know my mobile is secured ?

Verify your device certification status


Download this app to verify your mobile phone security
measures Open the Google Play Store app .
At the top right, tap the profile icon.
Safe Me app Tap Settings.
Under “About,” check if your device is Play Protect certified.

Scan your phone setting using secure security app

2023 prepared by : Ts.Dr.Sheila Mahalingam Ensure Your App Permissions Are Secure
Settings > Apps & notifications > Advanced > Permission
manager (or App permissions

Use Safe Browsing in Chrome

Google Play Protect


Dangerous Android Apps You Should Stay Away From

•UC Browser.
•CLEANit.
•Dolphin Browser.
•Virus Cleaner - Antivirus Free & Phone Cleaner.
•SuperVPN Free VPN Client.
•RT News.
2023 •Super Clean - Master of Cleaner.
prepared by : Ts.Dr.Sheila Mahalingam

•Fildo Music.
•Weather forecast app
How to know if your phone is hacked :

If Someone Catches My Unanswered Calls: *#61#:

*#062#: Redirection Code - use the code *#062# to see if your calls get redirected when
your phone is off. If this code returns a phone number, then that’s where your calls are
forwarded to.

you can use the code *#67# to see the number that receives your unanswered calls. If the
number that comes up isn’t yours, dial the code ##67# to reset your settings.
2023 prepared by : Ts.Dr.Sheila Mahalingam

Important Codes to Verify If Your Phone Is Being Tracked


Use the code *#21# to see if hackers track your phone with malicious intent.

##002#: The Catchall Code - The code ##002# is an anti-diversion code. It erases all
forwarded calls, messages, and other data and then resets the forwarding settings on your
phone.
How To Tell If Your Phone Is Hacked

Noticeable
Mysterious Pop-
decrease in battery
Ups
life

Sluggish
High Data Usage
Performance

2023 prepared by : Ts.Dr.Sheila Mahalingam

Unusual Activity
Outgoing Calls or
on Any Account
Texts You Didn’t
Linked to Your
Send:
Mobile Device
How to check if your iPhone has been hacked and
how to remove the hacks

2023 prepared by : Ts.Dr.Sheila Mahalingam


Youtube :
2023 prepared by : Ts.Dr.Sheila Mahalingam

Whoscall has been appointed by the Royal Police Malaysia (PDRM) as the strategic partner to
fight against serious fraud crime in Malaysia.

This collaboration involves fraud number database sharing from the PDRM CCID portal to
Whoscall's data system as an updated and reliable caller ID application for Malaysians.
8 Common-Sense Tips to Keep Your Smartphone Secure
5
1
2

3
4

2023 prepared by : Ts.Dr.Sheila Mahalingam

7
8
2023 prepared by : Ts.Dr.Sheila Mahalingam
ETHICS IN SOCIAL MEDIA

01 Protect your Information


P2P Share & Download

02 Making friends online


Chat Safe

2023 03 Spyware
preparedWatch
by : Ts.Dr.Sheila Mahalingam

04 Blog Safe

05 Cyberstalking & Harassment


Most popular apps for teenagers .

2023
YouTube (Ages 18+,prepared
or by : Ts.Dr.Sheila Mahalingam Snapchat (Ages 13+) TikTok (Ages 13+)
13 with Parent
Permission)

Instagram (Ages 13+) Discord (Ages 13+)


The Most Dangerous Apps for Teens
Discord
Bigo Live
Chat

2023
Bit Life
prepared by : Ts.Dr.Sheila Mahalingam
Omegle

Yubo
(formerly
Yellow)
2023 prepared by : Ts.Dr.Sheila Mahalingam
5 Types of threat and attack in SOCIAL MEDIA

Information
Fake Profile
Disclosure

Malicious Link
Phishing
2023 prepared by : Ts.Dr.Sheila Mahalingam
& Content

Social
Engineering
Tools to identify Fake Profile

https://tineye.com/

•1 They have blank sections in their profile.


•2 They've only posted one photo.
2023
•3 They don't have many friends or followers.
prepared by : Ts.Dr.Sheila Mahalingam

•4 They say they're in another country.


•5 They ask to chat off the dating app or site.
•6 Their messages have lots of errors.
Catfishing

2023 prepared by : Ts.Dr.Sheila Mahalingam


2023 prepared by : Ts.Dr.Sheila Mahalingam
Lottery and Free Gift Card Scam

2023 prepared by : Ts.Dr.Sheila Mahalingam


2023 prepared by : Ts.Dr.Sheila Mahalingam
Gossip Scam

2023 prepared by : Ts.Dr.Sheila Mahalingam


2023 prepared by : Ts.Dr.Sheila Mahalingam
Account Cancelled Scam

2023 prepared by : Ts.Dr.Sheila Mahalingam


Bullying Comment - Harrasment

2023 prepared by : Ts.Dr.Sheila Mahalingam


Threats in social media

Fake apps loaded with viruses or Cyberbullying and abuse


real apps that will sell your data
Fake friends or followers
Unbelievable news that’s really
malware
Phishing attempts with fake links
2023
Fake giveaways
prepared by : Ts.Dr.Sheila Mahalingam

Likejacking/clickjacking - Facebook
Private messages with dodgy links released a bookmarklet

Identity theft
2023 prepared by : Ts.Dr.Sheila Mahalingam
Who’s in your Facebook and Instagram accounts?
What to do if your Facebook receive anonymous fake profile
Confirm your phone number and e-mail address in the account
log in to your account settings; attackers can change those details to receive links or codes
for changing account passwords. If they did, change them back.

If you were able to log in, go to your account settings and check the
authenticity of the notification.
Set a new password, and make it one that is strong and that you
don’t use anywhere else.

proceed to Account logins

Scan all of your devices with a reliable antivirus to ensure they are
you see no suspicious entries, then the message was just phishing; delete
and move on. free of malware
2023 prepared by : Ts.Dr.Sheila Mahalingam

If you do see something suspicious in the list of account logins


Enable two-factor authentication to make hacking into your
accounts harder for cybercriminals, even if they get your password.

Immediately sign out of your account on all devices. On Instagram, you will
have to end each session manually in the Account logins menu. Facebook can
do it with a single click or tap under Security and Login in the settings.
Malaysia is 2nd in Asia for youth cyberbullying according to a United Nations Children's Fund (Unicef) report
Friday, 14 Jan 2022

2023 prepared by : Ts.Dr.Sheila Mahalingam


2023 prepared by : Ts.Dr.Sheila Mahalingam
MIND LIFE ACADEMY

Whom to contact ?

603 89926969

2023
019 266 5850- 24 hours
prepared by : Ts.Dr.Sheila Mahalingam

019 281 3801

www.mycert.org.my/cyber 999

cyber999@cybersecurity .my
What is the law on cyber harassment Malaysia?
Communications and Multimedia Act 1998 prohibits online content
that is obscene, indecent, false, menacing or offensive in character.
This could be used for online sexual harassment, hateful comments
and death or rape threats.

Is sexting a crime in Malaysia?


Under the law, taking, receiving and forwarding sexual
images of yourself or others is a crime, especially if the
photo is possess by someone who is under 18 years of
age.

This act is considered child pornography.


2023 prepared by : Ts.Dr.Sheila Mahalingam

http://aduan.skmm.gov.my/

Pusat Respons Scam Kebangsaan (NSRC)


Call NFCC at 03-88613830,
National Anti-Financial Crime Centre (NFCC) Malaysia
2023 prepared by : Ts.Dr.Sheila Mahalingam
MIND LIFE ACADEMY

THANK YOU
2023 prepared by : Ts.Dr.Sheila Mahalingam

You might also like