CYBERCRIME INVESTIGATION Crossword Puzzle

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 4. Intentional alteration or reckless interference with the functioning of a computer or computer network.
  2. 5. stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
  3. 8. pieces of computer code that can infect computer system causing disruptions to their normal operation.
  4. 10. surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
  5. 13. Intentional or reckless alteration, damaging, deletion of computer data.
  6. 14. a person illegally obtains data from a computer system by leaking it out in small amounts.
  7. 17. occurs when a person uses the Internet to steal someone’s identity and/or impersonate them to open a new credit card account or conduct some other financial transaction.
  8. 18. represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
  9. 19. crossing boundaries into other people’s property and/or causing damage, e.g. hacking, defacement, viruses.
  10. 20. proof of identity is an essential component to identify intruder.
  11. 21. malicious software programs which are infiltrated into computers disguised as benign applications or data.
  12. 22. the act of copying digital material posted online into the storage medium on one’s computer.
  13. 24. terrorist activity that targets computer networks and information systems for attack.
  14. 27. a notoriously slippery term used to denote representations, expressions, or actions ( often of a sexual nature) that are held to be generally offensive and thus unacceptable by society at large.
  15. 28. refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, and organization and user’s assets.
  16. 30. Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
  17. 31. the practice of allowing others to make copies of files stored on a computer via downloading. The practice is generally associated with the sharing of music, movies, images and software via websites dedicated to such copying.
  18. 32. the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
  19. 33. Acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same.
  20. 35. visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
  21. 39. Unlawful or prohibited acts of libel as defined in Article 355 of the Revised penal code, as amended, committed through a computer system.
  22. 40. Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
  23. 41. the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
  24. 44. any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
  25. 45. a general term for a variety of computer codes (such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
  26. 47. the right to be left alone; freedom from observation and interference from others.
  27. 48. the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
  28. 49. the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
  29. 50. a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
Down
  1. 1. is the condition of being protected against physical, social, spiritual, financial, political, emotional, occupational, psychological, educational or other types or consequences of failure, damage, error, accidents, harm or any other event in the Cyberspace which could be considered non-desirable.
  2. 2. Willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
  3. 3. an attack on a networked computer or computers that disrupts normal operations to such an extent that legitimate users can no longer access their services.
  4. 6. Access to the whole or any part of a computer system without right.
  5. 7. the activity of altering the code organizing a website so as to alter the visible screen content.
  6. 9. property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
  7. 11. a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
  8. 12. Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
  9. 15. negative information is spread online about a stock, driving down its price and enabling people to buy it at an artificially low price before rebuttals by the company’s officers reinflate the price.
  10. 16. a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
  11. 23. those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
  12. 25. is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
  13. 26. refers to a computer or a computer network, the electronic medium in which online communication takes place.
  14. 29. online marketplaces enabling individuals and businesses to post a wide variety of items for sale.
  15. 34. the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
  16. 36. criminal acts that tend to go largely unobserved, unremarked, and unrecorded in official assessments and measures of criminal activity.
  17. 37. political activism and social protest that uses hacking tools and techniques.
  18. 38. the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
  19. 42. the interactional space or environment created by linking computers together into a communication network.
  20. 43. legally institutionalized rights to own and control goods.
  21. 46. market economic activity undertaken via the internet or similar electronic communication networks.