CYBERCRIME INVESTIGATION (CROSSWORD PUZZLE)

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 2. Refers to a person who is intended by the originator to receive the electronic data message or electronic document.
  2. 4. A feature that allows other devices to share the mobile internet data of your mobile device.
  3. 7. The DICT law is otherwise known as ?
  4. 8. It refers to the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
  5. 11. A smartphone operating system developed by Google.
  6. 13. Read-only memory is _______ memory.
  7. 16. It is the interception of electronic communications in order to access information that usually involved a third party.
  8. 19. It is the process of preservation , identification, extraction, and documentation of computer evidence which can be used by the court of law.
  9. 20. Electronic device that manipulate information , or data, perform processes , calculations and operations based on instructions provided bu software or hardware program.
  10. 25. Defined as a visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
  11. 26. It is the criminal practice of using social engineering and voice over IP to gain access to private personal and financial information from the public for the purpose of financial reward.
  12. 30. The access to the whole or any part of a computer system without right.
  13. 31. Pieces of computer code that can infect computer system causing disruptions to their normal operation.
  14. 34. It is the interactional space or environment created by linking computers together into a communication network.
  15. 37. This act shall be known as the "Cybercrime Prevention Act of 2012".
  16. 39. It is the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
  17. 41. This Act shall be known as the “Intellectual Property Code of the Philippines.”
  18. 42. Method of communication that encode text character as standardized sequence of two different signal durations, called dots and dashes.
  19. 43. Refers to any computer instructions, data, or programs that can be stored electronically and executed by computer hardware.
  20. 45. It is the process of totally removing all traces of information in to the hard drive or computer.
  21. 46. Digital forensic process which involve physically or remotely obtaining possession of the computer data from the original digital storage media through digital forensic imaging process.
  22. 48. It is the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe
Down
  1. 1. It is an action with malicious intention to interrupt the operations of a network or steal the data, etc.
  2. 3. It is the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
  3. 5. Telephone- Far sound ; _______ - Distant writing
  4. 6. The property that information is not made available or disclose to unauthorized individual, entities or processes.
  5. 9. A hidden collective internet site only accessible by specialized web browser.
  6. 10. It involves identifying, identifying type of storage media, to determine the document.
  7. 12. A generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
  8. 14. Google – Standford University; FACEBOOK –
  9. 15. Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
  10. 17. Any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
  11. 18. First cellphone invented in the history of electronic communication.
  12. 20. It refers to the is safeguarding of society, people, organizations and nations from risks caused by threats that exploit an interconnected digital environment of networks, services, systems, and processes .
  13. 21. A systematic collection and organization of data by individuals or organizations so that it can be easily stored, retrieved, and edited for future use.
  14. 22. It is also called unsolicited commercial email.
  15. 23. It refers to the political activism and social protest that uses hacking tools and techniques.
  16. 24. What key is generally used for encryption process?
  17. 27. Interception made by technical means without right.
  18. 28. a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
  19. 29. A computer worm rapidly infects computer worldwide.
  20. 32. Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
  21. 33. It is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats.
  22. 35. A piece of software designed and created to update a computer program or its supporting data, to fix or improve it.
  23. 36. A data string used to verify the identity of a user.
  24. 38. Process of converting encoded/ decrypted data in a form that is readble and understood by a human or a computer.
  25. 40. An application that allows the sending of message between computer users via network.
  26. 44. It is Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
  27. 46. Confidentiality- Privacy ; Availability- ______
  28. 47. This act shall be known as the "Data Privacy Act of 2012".