Across
- 2. refers to the computer systems, and/or networks, whether physical or virtual
- 6. refers to the mathematical algorithm produced against digital information
- 7. refers to any representation of facts, information,
- 9. refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be
- 10. refers to any information contained in the form of computer data or any other form that is held by a service provider
- 12. refers to the willful engagement, maintenance, control or operation, directly or indirectly,
- 18. refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be
- 19. refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data
- 20. refers to the application of investigative and analytical techniques that conform to evidentiary standards
Down
- 1. refers to any computer data other than the content of the communication
- 3. refers to a set of instructions executed by the computer to achieve intended results
- 4. refers to any name or number that may be used alone or in conjunction with any other information to identify any specific individual,
- 5. refers to the modification or change, in form or substance, of an existing computer data or program
- 8. refers to the keeping of data that already exists in a stored form
- 11. refers to the collection of tools, policies, risk management approaches, actions, training, best practices
- 13. refers to evidence, the use of which is sanctioned by existing rules of evidence
- 14. refers to the person who created or is the origin of the assailed electronic statement or post using a computer system;
- 15. refers to digital information that may be used as evidence in a case.
- 16. also known as a forensic copy
- 17. refers to gathering and receiving information