CYBERCRIME INVESTIGATION (PUZZEL)

123456789101112131415161718192021222324252627282930313233343536373839404142434445
Across
  1. 3. a notoriously slippery term used to denote representations, expressions, or actions ( often of a sexual nature) that are held to be generally offensive and thus unacceptable by society at large.
  2. 5. Internet Auctions online marketplaces enabling individuals and businesses to post a wide variety of items for sale.
  3. 10. and thefts stealing( money, property), e.g. credit card fraud, intellectual property violations ( a.k.a piracy)
  4. 11. The Salami Slice an employee sets up a dummy account in the company’s computerized records. A small amount-even a few pennies- is subtracted from customers’ account and added to the account of the thief.
  5. 13. visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
  6. 14. or Cartridges these can be used to store copies of files from the computer for use in his investigation
  7. 15. market economic activity undertaken via the internet or similar electronic communication networks.
  8. 18. pieces of computer code that can infect computer system causing disruptions to their normal operation.
  9. 19. the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
  10. 22. the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
  11. 24. Internet Securities Fraud some criminals make use of internet chat rooms in their fraudulent schemes.
  12. 25. The Logic Bomb a program is secretly attached to the company’s computer system. The new program monitors the company’s work and wait for a sign of error to appear, some illogic that was designed for the computer to follow. Illogic causes the logic bomb to kick into an action and exploit the weakness.
  13. 27. Property property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
  14. 28. Screwdrivers and other tools used to dismantle the hardware for seizure.
  15. 30. terrorism terrorist activity that targets computer networks and information systems for attack.
  16. 31. any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
  17. 32. a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
  18. 34. the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
  19. 36. Horses malicious software programs which are infiltrated into computers disguised as benign applications or data.
  20. 37. leakage a person illegally obtains data from a computer system by leaking it out in small amounts.
  21. 41. Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
  22. 43. stalking stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
  23. 45. of Service an attack on a networked computer or computers that disrupts normal operations to such an extent that legitimate users can no longer access their services.
Down
  1. 1. crossing boundaries into other people’s property and/or causing damage, e.g. hacking, defacement, viruses.
  2. 2. doing psychological harm to, or inciting physical harm against others, thereby breaching laws relating to the protection of the person, e.g. hate speech, stalking.
  3. 4. political activism and social protest that uses hacking tools and techniques
  4. 5. a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
  5. 6. most computer programs used in business have built-in anti-theft safeguards. However employees can use a repair or maintenance program to supersede the antitheft program. Some tinkering with the program is required, But the “super-zapper” is soon able to order the system to issue checks to his or her private account.
  6. 7. Software or malware a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
  7. 8. surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
  8. 9. pornography breaching laws on obscenity and decency
  9. 12. those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms.
  10. 16. Defacement the activity of altering the code organizing a website so as to alter the visible screen content.
  11. 17. The Trojan Horseone computer is used to reprogram another for illicit purposes.
  12. 20. remember that often, latent prints can be taken from disks or other storage media or hardware.
  13. 21. Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
  14. 23. Camera equipment to videotape and photograph the scene.
  15. 26. Society a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
  16. 27. Crime criminal acts that tend to go largely unobserved, unremarked, and unrecorded in official assessments and measures of criminal activity.
  17. 29. the act of copying digital material posted online into the storage medium on one’s computer.
  18. 33. materials rubber bands, tape, boxes, bubble wrap, and if he does not have access to anti-static wrap, paper bags should be used, because they have less static charge than plastic bags.
  19. 34. Rights legally institutionalized rights to own and control goods.
  20. 35. the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
  21. 37. Impersonationan unauthorized person uses the identity of an unauthorized computer user to access the computer system.
  22. 38. Sharing the practice of allowing others to make copies of files stored on a computer via downloading. The practice is generally associated with the sharing of music, movies, images and software via websites dedicated to such copying.
  23. 39. the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
  24. 40. the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
  25. 41. Privacy the right to be left alone; freedom from observation and interference from others.
  26. 42. the interactional space or environment created by linking computers together into a communication net5work.
  27. 44. to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.