CYBERSPACE INVESTIGATION
Across
- 4. unlawful or prohibited acts of libel as defined in Article 355 of the Revised penal Code.
- 7. the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
- 11. cyber security body of knowledge.
- 13. proof of identity is an essential component to identify intruder.
- 16. alteration or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
- 18. the interactional space or environment created by linking computers together into a communication network.
- 19. any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- 20. alteration or deletion of computer data or program or interference in the functioning of a computer system.
- 24. computer security
- 26. malicious software programs which are infiltrated into computers disguised as benign applications or data.
- 27. refers to a person who in behalf of another person and with respect to a particular electronic document sends receives and/or stores provides other services in respect of that electronic data message or electronic document.
- 29. refers to listening to recording monitoring or surveillance of the content of communications.
- 30. pieces of computer code that can infect computer system causing disruptions to their normal operation.
- 36. visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- 40. an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- 42. stalking that takes place via online communication mechanism such as email chat rooms, instant messaging, and discussion lists.
- 43. publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- 44. is an assurance that comes from a proactive and standard-based identification and detection and an integrated protection and
- 45. open web application security project.
- 46. a general term for a variety of computer codes.
- 47. refers to the modification or change in form or substance of an existing computer data or program.
- 48. refers to the transmission of information through ICT media.
- 49. refers to a representation of information knowledge facts concepts or instructions which are being prepared processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system
Down
- 1. the willful engagement,maintenance control or operation,directly or indirectly of any lascivious exhibition of sexual organs.
- 2. a person infringes a right protected.
- 3. those property rights associated with original expressions.
- 5. varied threats.
- 6. refers to the collection of tools policies risk management approaches actions training best practices assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
- 8. criminal acts that tend to go largely unobserved.
- 9. social, economic,political and cultural process in which local and national spatial limits on interaction are overcome,and thus come to span the globe.
- 10. center for internet security.
- 12. popular term for copyright violations-the unauthorized copying distribution or sale of informational goods over which some party claims to possess propriety rights.
- 14. the fraudulent practice of establishing facsimiles or legitimate websites.
- 15. the right to be left alone freedom from observation and interference from others.
- 17. these can be used to store copies of files from the computer for use in his investigation.
- 19. terrorist activity that targets computer networks and information systems for attack.
- 21. techniques and tools associated with encoding or scrambling data.
- 22. the practice of allowing others to make copies of files stored on a computer via downloading.
- 23. means transferring or otherwise disposing of to another or obtaining control of with intent to transfer or dispose of.
- 25. the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- 28. the act of copying digital material posted online into the storage medium on one’s computer.
- 31. refers to a person who is intended by the originator to receive the electronic data message or electronic document.
- 32. market economic activity undertaken via the internet or similar electronic communication networks.
- 33. means natural person.
- 34. the act of creative problem solving when faced with complex technical problems.
- 35. generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- 37. notoriously slippery term used to denote representations expressions or actions often of a sexual nature.
- 38. political activism and social protest that uses hacking tools and techniques.
- 39. surveillance that focuses not upon the visual or other tracking of the physical individual
- 41. the term does not include a person acting as an intermediary with respect to that electronic document.
- 48. refers to a computer or a computer network the electronic medium in which online communication takes place.