CYBERCRIME
Across
- 3. it is the surveillance that focuses not upon the visual or other tracking of the physical individual but of collecting, collating and analyzing data about the individual’s activity often in the form of electronic records.
- 5. an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- 6. repeated harassing or threatening behavior in which an offender persistently contracts follows approaches threatens or otherwise subjects a victim to unwelcome attentions.
- 10. an offering that uses false or fraudulent claims to solicit investments or loans or that provides for the purchase, use, or trade of forged or counterfeit securities.
- 12. any illegal action that occurs within or via the use of electronic communication networks such as the Internet.
- 14. it is the crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
- 17. unauthorized access to, and interference with a computer system the illicit and typically illegal acts associated with unauthorized access to and interference with a computer system.
- 18. criminal acts that tend to go largely unobserved unremarked and unrecorded in official assessments and measures of criminal activity.
- 20. terrorist activity that targets computer networks and information systems for attack.
- 24. an act regulating the issuance and use of access device prohibiting fraudulent acts committed relative thereto providing penalties and other purposes.
- 25. an act emending certain provisions of republic act no. 8293
- 27. the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
- 33. an act providing for the recognition and electronic commercial and non-commercial transactions and documents penalties for the unlawful use thereof and for other purposes.
- 35. a general term for a variety of computer codes ( such as viruses, logic bombs and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- 36. it occurs when a person uses the Internet to steal someone’s identity and/or impersonate them to open a new credit card account or conduct some other financial transaction.
- 37. any non-public transmission of computer data to from or within a computer system intercepted by technical means without permission including electromagnetic emissions from a computer system containing such computer data.
- 38. the act of copying digital material posted online into the storage medium on one’s computer.
- 39. the interactional space or environment created by linking computers together into a communication network.
- 42. political activism and social protest that uses hacking tools and techniques.
- 44. market economic activity undertaken via the internet or similar electronic communication networks.
- 45. the fraudulent practice of establishing facsimiles or legitimate websites to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details credit card numbers and account passwords.
- 46. a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- 47. a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- 48. it should be charged with regular interval of time and it should be alpha numeric and should be difficult to judge.
- 50. stalking that takes place via online communication mechanism such as email chat rooms instant messaging and discussion lists.
- 51. unauthorized access to the entire or any part of a computer system.
Down
- 1. sexually explicit visual or written representations whose primary goal or usage is to generate sexual excitement.
- 2. group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network modes.
- 4. it is doing psychological harm to or inciting physical harm against others thereby breaching laws relating to the protection of the person eg hate speech stalking.
- 7. a program is secretly attached to the company’s computer system.
- 8. unauthorized copying distribution or sale of informational commodities over which some party claims property rights is referred to as copyright violations.
- 9. the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- 11. it is one computer is used to reprogram another for illicit purposes.
- 13. an illegally obtains data from a computer system by leaking it out in small amounts.
- 15. an act prescribing the intellectual property code and establishing the intellectual property office providing for its powers and fuctions and other purposes.
- 16. a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
- 19. an investment scheme in which investors are promised abnormally high profits on their investments.
- 21. act defining cybercrime providing for the prevention investigation supression and the imposition of penalties therefor and for other purposes.
- 22. property that takes the form of ideas expressions sign symbols designs logos and similar intangible forms.
- 23. most computer programs used in business have built-in anti-theft safeguards.
- 26. a techniques and tools for encoding or scrambling data in such a way that it is incomprehensible to those who do not have access to the key required to decode the data back into its original legible form.
- 28. the crime that occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
- 29. it is generally implemented using firewalls which provide a centralized point from which to permit or allow to access.
- 30. a generally derogatory term used to describe activities associated with hacking in its second sense that of unauthorized access to computer systems.
- 31. it is a crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
- 32. an interactive technologies that allow the creation or sharing/exchange of information ideas career interests and other forms of expression via virtual communities and networks.
- 34. the most sensitive component as prevention from cybercrime.
- 40. pieces of computer code that can infect computer system causing disruptions to their normal operation.
- 41. it is a negative information is spread online about a stock driving down its price and enabling people to buy it at an artificially low price before rebuttals by the company’s officers reinflate the price.
- 43. the right to be left alone freedom from observation and interference from others.
- 49. these can be used to store copies of files from the computer for use in his investigation.