CYBERCRIME INVESTIGATION
Across
- 10. refers to a set of instructions executed by the computer to achieve intended results.
- 14. the interactional space or environment created by linking computers together into a communication network.
- 16. the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
- 19. the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
- 20. means any card, plate, code, account number, electronic serial number, personal identification number, or other telecommunications service, equipment, or instrumental identifier, or other means of account access that can be used to obtain money, good, services, or any other thing of value or to initiate a transfer of funds
- 21. the system of hardware,software, facilities and service components that support the delivery of business systems and digital-enabled processes.
- 23. a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
- 24. pieces of computer code that can infect computer system causing disruptions to their normal operation.
- 25. It is when an individual or entity who has knowledge of a security breach and of the obligation to notify the Commission pursuant to Section 20(f) of the Act, intentionally or by omission conceals the fact of such security breach.
- 26. an attack on a networked computer or computers that disrupts normal operations to such an extent that legitimate users can no longer access their services.
- 28. refers to a person by whom, or on whose behalf, the electronic document purports to have been created, generated and/or sent. The term does not include a person acting as an intermediary with respect to that electronic document.
- 30. refers to the transmission of information through ICT media, including voice, video and other forms of data.
- 31. t is when an individual or entity with malice or in bad faith, discloses unwarranted or false information relative to any personal information or sensitive personal information obtained by him or her
- 35. refers to any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which identity can be established
- 36. any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- 38. Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- 42. is digital service infrastructure has to be designed, built, integrated, operated, and audited in accordance with evaluated risks and technical security measures described by R.A. 10175, Cyber Crime Prevention Act of 2012, DICT National Cyber Security 2022, and R.A. 10173, Data Privacy Act of 2012.
- 43. refers to a secret code which secures and defends sensitive information that cross over public channels into a form decipherable only with a matching electronic key.
- 45. the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- 47. is acquired and integrated to deliver and support the business outcomes, and the service objectives of cybercrime prevention and privacy protected data collection, retention, transmission, utilization, presentation, sharing, repurposing, and disposal.
- 48. is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
- 49. represents the definitive view of the of privacy rights, privacy principles and security measuresin the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
- 50. is preservation of confidentiality, integrity and availability of
Down
- 1. The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
- 2. The access to the whole or any part of a computer system without right.
- 3. refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system including a program suitable to cause a computer system to perform a function and includes electronic documents and/or electronic data messages whether stored in local computer systems or online.
- 4. The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
- 5. refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device.
- 6. the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
- 7. refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or electronic document or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic data message or electronic document.
- 8. physical security is most sensitive component, as prevention from cybercrime. Computer network should be protected from access of unauthorized persons.
- 9. those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms.
- 11. means transferring, or otherwise disposing of, to another, or obtaining control of, with intent to transfer or dispose of.
- 12. refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
- 13. is about single or a series of unwanted or unexpected information security events that have a significant probability of compromising business operations and threatening information security.
- 15. refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
- 17. It is when personal information is made accessible due to negligence and without being authorized by any existing law.
- 18. refers to a person who is intended by the originator to receive the electronic data message or electronic document.
- 22. malicious software programs which are infiltrated into computers disguised as benign applications or data.
- 27. refers to a comprehensive plan of actions designed to improve the security and enhance cyber resilience of infrastructures and services.
- 29. the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- 32. physical, social, spiritual, financial, political, emotional, occupational, psychological, educational or other types or consequences of failure, damage, error,accidents, harm or any other event in the Cyberspace which could be considered non-desirable.
- 33. The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
- 34. surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
- 37. terrorist activity that targets computer networks and information systems for attack.
- 39. the act of copying digital material posted online into the storage medium on one’s computer.
- 40. The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same,
- 41. refers to a computer or a computer network, the electronic medium in which online communication takes place.
- 44. is the condition of being protected
- 46. the right to be left alone; freedom from observation and interference from others.