What is Cyberstalking?
Cyberstalking is described as continuously monitoring, tracking, or harassing someone online, generally with harmful intent.
How can you stay safe from cyberstalking, by guarding your ________ _______?
By guarding your personal information.
What is webcam hacking?
Webcam hacking involves the illegal use of someone else's camera for monitoring purposes.
What is the first step recommended when dealing with cyberstalking, where victims are advised not to _________ with the stalker?
Not engaging with the stalker.
How does cyberstalking differ from cyberbullying?
Cyberstalking involves continuously monitoring, tracking, or harassing someone online with harmful intent. Whereas cyberbullying usually involves people that you know that have the intent of intimidating, humiliating, or emotionally harming.
How can you protect yourself from cyberstalking by ensuring your devices are _________?
By installing anti-malware software and keeping everything updated.
What is one sign of cyberstalking where you receive __________ from someone you do not want to hear from, even after asking them to stop?
Getting messages or emails from unwanted individuals.
What is the second step in dealing with cyberstalking, where victims are advised to report it to the _______?
Reporting cyberstalking incidents to the police.
What are some common forms of cyberstalking?
Cyberstalking can exist in various forms such as slander, defamation, false accusations, catfishing, and outright threats.
What is the next step individuals should take after experiencing cyberstalking?
Reporting it to the police.
What is doxxing?
Doxxing is the public release of private information about an individual online.
What is the third step in dealing with cyberstalking, where victims are advised to keep ___________?
Documenting everything related to the cyberstalking.
How do cyberstalkers typically initiate their actions?
Cyberstalkers typically start small by sending a few messages to their victim and may escalate their actions over time.
How can individuals gather evidence to support their case against cyberstalking?
By documenting everything, including screenshots or printed pages.
What is a sign of cyberstalking where the stalker creates _____ ______ to communicate with you or pretends to be someone else?
Making fake profiles to deceive or harass the victim.
What is the fourth step in dealing with cyberstalking, where victims are advised to focus on enhancing their __________?
Focusing on online security measures.
How do cyberstalkers take advantage of their victims?
Cyberstalkers take advantage of their victims by using digital means to stalk and harass them, sometimes leading to legal consequences.
What plan can victims of cyberstalking utilize to regain their online privacy, security, and confidence?
Using a Cyberstalking Action Plan, designed to help victims recover from cyberstalking incidents.
What is IoT device cyberstalking?
IoT device cyberstalking refers to using and controlling smart devices such as smart fridges or smart TVs to harass individuals.
What is the final step in dealing with cyberstalking, where victims are advised to work through a plan to ____________?
Working through a Cyberstalking Action Plan.