CYBERCRIME INVESTIGATION (CROSSWORD PUZZLE)
Across
- 2. Refers to a person who is intended by the originator to receive the electronic data message or electronic document.
- 4. A feature that allows other devices to share the mobile internet data of your mobile device.
- 7. The DICT law is otherwise known as ?
- 8. It refers to the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- 11. A smartphone operating system developed by Google.
- 13. Read-only memory is _______ memory.
- 16. It is the interception of electronic communications in order to access information that usually involved a third party.
- 19. It is the process of preservation , identification, extraction, and documentation of computer evidence which can be used by the court of law.
- 20. Electronic device that manipulate information , or data, perform processes , calculations and operations based on instructions provided bu software or hardware program.
- 25. Defined as a visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- 26. It is the criminal practice of using social engineering and voice over IP to gain access to private personal and financial information from the public for the purpose of financial reward.
- 30. The access to the whole or any part of a computer system without right.
- 31. Pieces of computer code that can infect computer system causing disruptions to their normal operation.
- 34. It is the interactional space or environment created by linking computers together into a communication network.
- 37. This act shall be known as the "Cybercrime Prevention Act of 2012".
- 39. It is the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
- 41. This Act shall be known as the “Intellectual Property Code of the Philippines.”
- 42. Method of communication that encode text character as standardized sequence of two different signal durations, called dots and dashes.
- 43. Refers to any computer instructions, data, or programs that can be stored electronically and executed by computer hardware.
- 45. It is the process of totally removing all traces of information in to the hard drive or computer.
- 46. Digital forensic process which involve physically or remotely obtaining possession of the computer data from the original digital storage media through digital forensic imaging process.
- 48. It is the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe
Down
- 1. It is an action with malicious intention to interrupt the operations of a network or steal the data, etc.
- 3. It is the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- 5. Telephone- Far sound ; _______ - Distant writing
- 6. The property that information is not made available or disclose to unauthorized individual, entities or processes.
- 9. A hidden collective internet site only accessible by specialized web browser.
- 10. It involves identifying, identifying type of storage media, to determine the document.
- 12. A generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- 14. Google – Standford University; FACEBOOK –
- 15. Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
- 17. Any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- 18. First cellphone invented in the history of electronic communication.
- 20. It refers to the is safeguarding of society, people, organizations and nations from risks caused by threats that exploit an interconnected digital environment of networks, services, systems, and processes .
- 21. A systematic collection and organization of data by individuals or organizations so that it can be easily stored, retrieved, and edited for future use.
- 22. It is also called unsolicited commercial email.
- 23. It refers to the political activism and social protest that uses hacking tools and techniques.
- 24. What key is generally used for encryption process?
- 27. Interception made by technical means without right.
- 28. a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- 29. A computer worm rapidly infects computer worldwide.
- 32. Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- 33. It is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats.
- 35. A piece of software designed and created to update a computer program or its supporting data, to fix or improve it.
- 36. A data string used to verify the identity of a user.
- 38. Process of converting encoded/ decrypted data in a form that is readble and understood by a human or a computer.
- 40. An application that allows the sending of message between computer users via network.
- 44. It is Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- 46. Confidentiality- Privacy ; Availability- ______
- 47. This act shall be known as the "Data Privacy Act of 2012".