Basics
Methods & Techniques
Impact on Victims
Prevention
100

This term describes the use of the internet or other electronic means to harass or stalk someone.

Cyberstalking

100

This method involves observing a person's online activity to analyze their behavior patterns.

Monitoring Social Media Activity

100

This mental health issue can develop in victims of cyberstalking due to stress, fear, and emotional trauma.

Anxiety or depression

100

This action helps prevent unauthorized access to sensitive information, such as your email or banking accounts. This action helps prevent unauthorized access to sensitive information.

Strong passwords / Two-factor authentication

200

This term refers to creating fake profiles or copying existing ones on social media to manipulate or decive victims.

Catfishing

200

Software that secrectly monitors a victim's location, messages, and internet activity without their consent.

Stalkware/Spyware
200

This is a financial impact of cyberstalking, where victims may face expenses for therapy or legal help.

Money issues

200

By adjusting these settings on social media, you can control who can see your posts and personal details.

Privacy settings

300

This is a common form of cyberstalking where the perpetrator uses a victim’s name to pose as them online, often causing confusion or harm.

Impersonation

300

This technology allows a cyberstalker to track a victim’s location by analyzing metadata in photos that include information like time and place.

Geotags

300

Cyberstalking can cause victims to experience poor sleep and fatigue.

Physical health problem

300

This is a secure method to connect to the internet and avoid using public Wi-Fi for sensitive activities.

Virtual Private Network (VPN)

400

The legal term for "stalking" in most jurisdictions refers to this type of behavior, which can be physical or electronic.

Harassment

400

This is the malicious software that can be used to remotely activate a victim’s camera to monitor them.

Hijacking a webcam

400

This is the term for when victims of cyberstalking isolate themselves to stay safe.

Loneliness

400

When using social media, you should avoid sharing this, especially in real time.

Tagging / Location

500

This type of relationship is the most common form of cyberstalking, where the perpetrator knows the victim intimately.

Intimate partner

500

This popular mapping service can be used by cyberstalkers to monitor a victim’s location.

Google Maps

500

When a business is targeted by cyberstalkers, it can face this consequence, potentially leading to a loss of trust and customers.

Reputation damage

500

To protect yourself from cyberstalking, you should regularly review and revoke these from apps to avoid unnecessary data access.

App permissions?