1 of 17

Online Safety

1

2 of 17

Think before you click !

Everyone is talking about online security and how we should implement it in our cyber-world but have you ever really taken a moment and thought about what that actually means?

2

3 of 17

What is meant by the term:

Online Safety” ?

4 of 17

Internet Security or Online Security

... is the ability to maximize the user's personal security risks related to private information and the property related to the use of the Internet, as well as self-protection against cybercrime in general.

As the number of Internet users continues to grow worldwide, Internet security is an increasing concern for children and adults.

4

5 of 17

  • When we talk about Internet security, we primarily mean the secrecy and integrity of our own personal data, the security of our own computer, the secrecy of our own web and mail traffic, and lately perhaps the most popular, access to Internet banking sites.
  • In order to achieve a satisfactory level of security, it is necessary to install certain programs on the existing operating system to defend against various types of malicious software.

The installation of the most modern security programs alone is not enough for a satisfactory level of security because no security system is 100% secure. It also requires a certain amount of knowledge, computer literacy and awareness of the possibilities and security aspects when browsing content on the Internet.

  • An Internet connection also implies a certain level of responsibility in terms of maintaining the computer and the network that uses that connection.
  • Most social networks and chat sites have a page about security.

Numerous groups, governments and organizations have expressed concern and are committed to the safety of children as well as adults who use the internet.

5

6 of 17

INFORMATION SECURITY

Sensitive information such as personal information, identity or password is often associated with personal property (for example, bank accounts) and privacy, and can pose security problems if it "leaks". Unauthorized access to and use of private data can result in identity theft, as well as theft of property. Common causes of information security breaches include:

  • Identity theft or phishing - identity theft is a type of fraud where fraudsters disguise themselves as a reliable source in an attempt to obtain private information such as passwords and credit card information, etc. via the Internet. Identity theft is often done via email and instant messaging and may include links to websites that direct the user to enter their private information. These fake websites are often designed to look identical to legitimate sites to avoid user suspicion
  • Internet scams - schemes that deceive the user in various ways trying to take advantage of them. Internet scams often aim to deceive the victim, the owner of personal property directly, not their personal data, through false promises, trust tricks and much more.
  • Malware - Malicious software, especially spyware, is malicious software disguised as software designed to collect and transmit private data, such as passwords, without the consent or knowledge of the user. They are often distributed via email, software and files from unofficial sites. Malware is one of the most common security problems because it is often not possible to determine if a file is infected despite the source of the file.

6

7 of 17

PERSONAL SECURITY

The growth of the internet has led to many important services available to anyone who has a connection. One of these important services is digital communication. Although this service enabled communication with others via the Internet, it also enabled communication with malicious users. Some of the possible threats to our personal security are:

  • Cyberstalking - involves the use of the Internet or other electronic means to harass an individual, group of individuals or organization. This may include false accusations or statements of fact (defamation), surveillance, threats, identity theft, damage to data or equipment, persuading minors to have sex, or gathering information that can be used to harassment.
  • Cyberbullying - an attack on an individual or group through the use of electronic means such as instant messaging, social media, e-mails and other forms of Internet communication with the intent to abuse, intimidate or overcome.
  • Online lecture - involves persuading a minor to engage in inappropriate sexual intercourse via the Internet. Online predators can try to initiate and seduce minors into relationships through chat rooms or online forums.
  • Offensive content - Various websites on the Internet contain material that some consider offensive, distasteful or explicit, that spread hate speech or other inappropriate content. Such content can manifest in many ways, such as pop-up ads or links that don’t seem suspicious.

7

8 of 17

Just a few precautions can protect us from exposure to any of the above threats!

9 of 17

Create complex passwords

We know you’ve heard this before, but creating strong and unique passwords for all your essential accounts is really the best way to store personal and financial information. This is especially important in an age of widespread corporate hacks, where a single database attack can reveal tens of thousands of user passwords. If you reuse passwords, a hacker can extract data from one attack and use it to log in to other accounts.

Improve network security

Now that your logins are more secure, make sure your connections are secure. When you’re at home or work, you’re probably using a password-protected router that encrypts your data. But when you’re on the go, you might be using free public Wi-Fi services. The problem with public Wi-Fi is that it is often unsecured. This means that it is relatively easy for a hacker to access your device or information. So you should consider investing in a virtual private network (VPN). A VPN is a piece of software that creates a secure connection over the Internet, so you can securely connect from anywhere.

Use a firewall

Even if your network is secure, you should still use a firewall. It is an electronic barrier that blocks unauthorized access to your computers and devices, and often includes security software. Using a firewall ensures that all devices connected to your network are secured, including IoT devices such as smart thermostats and webcams. This is important because many IoT devices are not equipped with security measures, which provides hackers vulnerable access points to the entire network.

9

10 of 17

Click carefully

Make sure you don't get in danger by clicking carelessly. Many of today’s online threats are based on phishing or social engineering. This involves a situation where you are tricked into revealing personal or sensitive information that will be used to carry out various scams. Spam, fake "free" offers, lures, online quizzes and more, use these tactics to encourage you to click on dangerous links or reveal your personal information. Always be careful with offers that sound too good to be true or ask for too much information.

Be more selective "Sharer"

These days, there are many opportunities to share our personal information online. Just be careful about what you share, especially when it comes to your identity. This can potentially be used to impersonate or to guess and guess your passwords.

Protect your mobile life.

Our mobile devices can be just as vulnerable to online threats just as our laptops. In fact, mobile devices face new risks, such as risky apps and dangerous links sent via text messages. Be careful where you click, don't reply to messages from strangers, and download the apps only from official app stores after first reading other users' reviews. Make sure security software is enabled on your mobile device, as well as on computers and other devices.

10

11 of 17

Practice safe surfing and shopping.

When shopping online or visiting online banking sites or other sensitive transactions, always make sure the website address starts with "https" instead of just "http" and has a padlock icon in the URL field. This indicates that the website is secure and uses encryption to protect your data so that others cannot intercept it. Also, look out for websites that have misspelled words or bad grammar in their addresses. Such sites could be copies of legitimate websites. Use secure search tools to avoid risky websites.

Be up to date

Update your software regularly to have the latest security measures. Turn on automatic updates so you don’t have to think about it, and make sure your security software is set to scan regularly.

Find out about scams

Online threats are evolving all the time so make sure you know what to look out for. Currently, the principle of "ransom" is on the rise. This is a situation where a hacker threatens to deny you access to all your files and data if you do not agree to pay a ransom. Be informed of these and other threats to avoid them.

Data back-up

Always be careful about what you do online, the sites you visit, and what you share. Use security software and copy your data regularly in case something goes wrong.

11

12 of 17

12

13 of 17

13

14 of 17

14

STOP

CONNECT

THINK

15 of 17

Who to contact if online violence occurs?

15

  • Oneworld Platform is a human rights organization

internet, and is the only organization in Bosnia and Herzegovina that deals

exclusively to these matters.

  • If we are talking about digital women's rights Oneworld on the one hand deals with the empowerment of women through technology whether it is about politicians who help to campaign through social networks or about journalists who educate about various tools for data protection and privacy, and on the other hand cyberbullying, which is still unrecognized as a type of violence in BiH, but also in the region. It works to improve knowledge from all angles, from regular users who have only social networks and e-mail or one of the two, to girls and women who are engaged in public work in any sphere.

  • Oneworld Platform has worked with users aged eight to 88 in BiH and the region. The most common forms of violence occurred between the ages of 10 and 20, and this internet violence is usually related to school desks - primary, secondary and university.

16 of 17

16

If we decide to have social networks and communication tools - it is important not to reveal on social networks the following:

  • Phone number, residential address, and even date of birth, it would also be good not to disclose your physical movement.

  • Another thing, we shouldn’t share our intimate photos with anyone that we wouldn’t be willing to share with everyone. Because, we are never sure who is looking from the other side, and where someone who is close to us at that moment can pass it on.

  • The third very important thing is never to share your personal passwords with your best friends and partners.

But if all this is already happening, the first feelings that develop are shame and fear. Victims of violence begin to suffer from depression and develop a desire for self-harm and suicide. Most often, this problem is not talked about as a problem of internet violence, but it is considered that these are some other problems that are the cause of such behaviors, and these cases remain unrecorded.

The most important is the first step: to tell anyone. This can be a best friend, sister, brother, elderly person in the environment or parents. Step number two should definitely be the police, especially in cases where the victims are minors.

17 of 17

17

Post carefully - your posts represent you online.

Be kind - always be kind and friendly to people online, without exception.

Be socially aware - How we manage our social media profiles is very important.

The power is in the passwords - always make sure your passwords are unique and complex.

Watch out for phishing - be aware of the emails you receive and suspicious links, keep your identity.

Talk about cyberbullying - if you know someone who is facing this problem or you are the subject of violence yourself, seek help.

Danger Zones - Avoid suspicious websites, ads, etc.