Cyberstalking Basics
Prevention Tactics for Cyberstalking
Signs/Types of Cyberstalking
Dealing with Cyberstalking
100

What is Cyberstalking?

Cyberstalking is described as continuously monitoring, tracking, or harassing someone online, generally with harmful intent.

100

How can you stay safe from cyberstalking, by guarding your ________ _______?

By guarding your personal information.

100

What is webcam hacking?

Webcam hacking involves the illegal use of someone else's camera for monitoring purposes.

100

What is the first step recommended when dealing with cyberstalking, where victims are advised not to _________ with the stalker?

Not engaging with the stalker.

200

How does cyberstalking differ from cyberbullying?

Cyberstalking involves continuously monitoring, tracking, or harassing someone online with harmful intent. Whereas cyberbullying usually involves people that you know that have the intent of intimidating, humiliating, or emotionally harming.

200

How can you protect yourself from cyberstalking by ensuring your devices are _________?

By installing anti-malware software and keeping everything updated.

200

What is one sign of cyberstalking where you receive __________ from someone you do not want to hear from, even after asking them to stop?

Getting messages or emails from unwanted individuals.

200

What is the second step in dealing with cyberstalking, where victims are advised to report it to the _______?

 Reporting cyberstalking incidents to the police.

300

What are some common forms of cyberstalking?

Cyberstalking can exist in various forms such as slander, defamation, false accusations, catfishing, and outright threats.

300

What is the next step individuals should take after experiencing cyberstalking?

Reporting it to the police.

300

What is doxxing?

Doxxing is the public release of private information about an individual online.

300

What is the third step in dealing with cyberstalking, where victims are advised to keep ___________?

Documenting everything related to the cyberstalking.

400

How do cyberstalkers typically initiate their actions?

Cyberstalkers typically start small by sending a few messages to their victim and may escalate their actions over time.

400

How can individuals gather evidence to support their case against cyberstalking?

By documenting everything, including screenshots or printed pages.

400

What is a sign of cyberstalking where the stalker creates _____ ______ to communicate with you or pretends to be someone else?

Making fake profiles to deceive or harass the victim.

400

What is the fourth step in dealing with cyberstalking, where victims are advised to focus on enhancing their __________?

Focusing on online security measures.

500

 How do cyberstalkers take advantage of their victims?

Cyberstalkers take advantage of their victims by using digital means to stalk and harass them, sometimes leading to legal consequences.

500

What plan can victims of cyberstalking utilize to regain their online privacy, security, and confidence?

Using a Cyberstalking Action Plan, designed to help victims recover from cyberstalking incidents.  

500

What is IoT device cyberstalking?

IoT device cyberstalking refers to using and controlling smart devices such as smart fridges or smart TVs to harass individuals.

500

What is the final step in dealing with cyberstalking, where victims are advised to work through a plan to ____________?

Working through a Cyberstalking Action Plan.