Cybercrime Crossword Puzzle
Across
- 3. Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
- 5. interception Interception made by technical means without right.
- 11. is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
- 12. Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- 13. is an ethical computer hacker or a computer security expert who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
- 14. is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
- 17. is an electronic data storage device used for storing digital information typically using flash memory.
- 18. includes the vast network of highways connecting bridges and tunnels railways utilities and buildings necessary to maintain normalcy in daily life.
- 20. is digital service infrastructure has to be designed built integrated operated and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
- 22. when individual handling personal information knowingly or negligently disposed discard or abandon in an area accessible to the public or has otherwise placed the
- 26. a string of characters that allows access to a computer system or service.
- 27. Intentional alteration or reckless interference with the functioning of a computer or computer network.
- 28. It is offense against the confidentiality integrity and availability of computer data and systems.
- 30. It is when an individual handling personal information or intentional knowingly and unlawfully or violating data confidentiality breach and security.
- 33. Breach It is when an individual or entity who has knowledge of a security breach and of the obligation.
- 34. A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox
- 35. is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
- 39. is a data storage device that includes flash memory with an integrated USB interface.
- 43. the process of converting encrypted information back into normal, understandable text.
- 44. what comes after terabyte
- 45. Intentional or reckless alteration damaging deletion of computer data.
- 47. is a concept describing a widespread interconnected digital technology.
- 49. refers to activities that seek to compromise digital devices such as computers smartphones tablets and even entire networks.
Down
- 1. It is when an individual or entity discloses to third party personal information.
- 2. is a hacker who violates computer security for their own personal profit or out of malice.
- 4. is a suspected attempted successful or imminent threat of unauthorized access use disclosure breach modification or destruction of information interference with information technology operations or significant violation of responsible use policy.
- 6. is data that describes other data.
- 7. protection of computer systems and networks from information disclosure theft of or damage to their hardware software or electronic data as well as from the disruption or misdirection of the services they provide.
- 8. what comes after zettabyte.
- 9. is a form of phishing that uses mobile phones as the attack platform to gather personal details like SSN or credit card number.
- 10. protecting information or hiding its meaning by converting it into a secret code before sending it out over a public network
- 15. Acquisition of a domain name over the internet in bad faith to profit mislead destroy reputation and deprive others from registering.
- 16. It is when an individual or entity with malice or in bad faith.
- 19. sexual arousal using computer technology especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
- 21. is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
- 23. is a form of bullying or harassment using electronic means.
- 24. is a specific aspect of broader concepts such as cybersecurity and computer security being focused on the specific threats and vulnerabilities of online access and use of the internet.
- 25. measures promoting the safe usage of the internet especially in order to protect against viruses fraud or other forms of attack.
- 26. information of an individual in any container for trash collection.
- 29. is the World Wide Web content that exists on darkness overlay networks that use the Internet but require specific software configurations or authorization to access.
- 31. 10175 An act defining cybercrime providing for the prevention.
- 32. is a shortfall that comes from fragmented thinking reactive acquisition and unmanaged vulnerability against the known threats that violate confidentiality, integrity availability and privacy of information in the infrastructure, process data application and agreements of service delivery.
- 36. is pornography that exploits children for sexual stimulation
- 37. a programmable electronic device designed to accept data perform prescribed mathematical and logical operations at high speed and display the results of these operations.
- 38. global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- 40. Generally used to refer to someone who gains access to a system, software, or hardware without permission
- 41. Access to the whole or any part of a computer system without right.
- 42. Malicious software, such as a virus or a worm, that attacks a target computer.
- 46. is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device steals sensitive information and internet usage data and relays it to advertiser’s data firms or external users.
- 48. an application that allows the sending of messages between computer users via a network.