CYBERCY INVESTIGATION (CROSSWORD PUZZLE)
Across
- 4. Telephone- Far sound ; _______ - Distant writing
- 8. It is the interception of electronic communications in order to access information that usually involved a third party.
- 9. Interception made by technical means without right.
- 10. Defined as a visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
- 15. This act shall be known as the "Data Privacy Act of 2012".
- 16. It is the process of totally removing all traces of information in to the hard drive or computer.
- 17. Google – Standford University; FACEBOOK –
- 21. It is the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- 26. Refers to any computer instructions, data, or programs that can be stored electronically and executed by computer hardware.
- 27. The property that information is not made available or disclose to unauthorized individual, entities or processes.
- 29. It is the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe
- 31. It is the interactional space or environment created by linking computers together into a communication network.
- 32. It is an action with malicious intention to interrupt the operations of a network or steal the data, etc.
- 33. Process of converting encoded/ decrypted data in a form that is readble and understood by a human or a computer.
- 35. A computer worm rapidly infects computer worldwide.
- 36. A smartphone operating system developed by Google.
- 42. This act shall be known as the "Cybercrime Prevention Act of 2012".
- 43. It is the process of preservation , identification, extraction, and documentation of computer evidence which can be used by the court of law.
- 44. A piece of software designed and created to update a computer program or its supporting data, to fix or improve it.
- 45. It refers to the is safeguarding of society, people, organizations and nations from risks caused by threats that exploit an interconnected digital environment of networks, services, systems, and processes .
- 47. Digital forensic process which involve physically or remotely obtaining possession of the computer data from the original digital storage media through digital forensic imaging process.
- 48. It refers to the political activism and social protest that uses hacking tools and techniques.
Down
- 1. What key is generally used for encryption process?
- 2. It is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats.
- 3. First cellphone invented in the history of electronic communication.
- 5. It refers to the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
- 6. It involves identifying, identifying type of storage media, to determine the document.
- 7. A generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
- 10. It is the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
- 11. Refers to a person who is intended by the originator to receive the electronic data message or electronic document.
- 12. Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
- 13. It is also called unsolicited commercial email.
- 14. Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
- 18. a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- 19. Confidentiality- Privacy ; Availability- ______
- 20. A hidden collective internet site only accessible by specialized web browser.
- 22. It is the criminal practice of using social engineering and voice over IP to gain access to private personal and financial information from the public for the purpose of financial reward.
- 23. A systematic collection and organization of data by individuals or organizations so that it can be easily stored, retrieved, and edited for future use.
- 24. Read-only memory is _______ memory.
- 25. The DICT law is otherwise known as ?
- 28. Any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
- 30. It is Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- 31. Electronic device that manipulate information , or data, perform processes , calculations and operations based on instructions provided bu software or hardware program.
- 34. An application that allows the sending of message between computer users via network.
- 37. A feature that allows other devices to share the mobile internet data of your mobile device.
- 38. Pieces of computer code that can infect computer system causing disruptions to their normal operation.
- 39. Method of communication that encode text character as standardized sequence of two different signal durations, called dots and dashes.
- 40. The access to the whole or any part of a computer system without right.
- 41. A data string used to verify the identity of a user.
- 46. This Act shall be known as the “Intellectual Property Code of the Philippines.”