Across
- 1. measures promoting the safe usage of the internet, especially in order to protect against viruses, fraud, or other forms of attack.
- 5. is a form of bullying or harassment using electronic means
- 8. Interception made by technical means without right
- 11. It is when an individual or entity with malice or in bad faith
- 12. is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
- 15. is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access
- 18. is data that describes other data.
- 19. Intentional or reckless alteration, damaging, deletion of computer data
- 20. protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
- 21. is a hacker who violates computer security for their own personal profit or out of malice.
- 22. is a type of social engineering where an attacker sends a fraudulent ("spoofed") message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.
- 25. is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.
- 29. a string of characters that allows access to a computer system or service.
- 30. a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations
- 32. sexual arousal using computer technology, especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
- 33. of 2012 therefore and for other purposes
- 35. act protecting individual personal information in information and communication systems in the government and the private sector, creating for this purpose a National Privacy Commission, and for other purposes.
- 37. It is offense against the confidentiality, integrity and availability of computer data and systems.
- 39. is pornography that exploits children for sexual stimulation.
- 42. information of an individual in any container for trash collection.
- 43. is an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
- 45. what comes after terabyte
- 46. It is when personal
- 48. is a form of phishing that uses mobile phones as the attack platform to gather personal details, like SSN or credit card number.
- 49. is a suspected, attempted, successful, or imminent threat of unauthorized access, use, disclosure, breach, modification, or destruction of information; interference with information technology operations; or significant violation of responsible use policy
- 50. is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Down
- 2. is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
- 3. is any crime or illegal online activity committed on the Internet, through the Internet or using the Internet.
- 4. Intentional alteration or reckless interference with the functioning of a computer or computer network
- 6. when individual handling personal information knowingly or negligently disposed, discard, or abandon in an area accessible to the public or has otherwise placed the
- 7. includes the vast network of highways, connecting bridges and tunnels, railways, utilities and buildings necessary to maintain normalcy in daily life.
- 9. It is when an individual handling personal information or intentional knowingly and unlawfully, or violating data confidentiality breach and security
- 10. breach It is when an individual or entity who has knowledge of a security breach and of the obligation
- 13. It is when an individual or entity discloses to third party personal information.
- 14. is a concept describing a widespread interconnected digital technology.
- 16. is digital service infrastructure has to be designed, built, integrated, operated, and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
- 17. is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
- 23. Prevention investigation, suppression and the imposition of penalties
- 24. is a data storage device that includes flash memory with an integrated USB interface.
- 25. refers to a comprehensive plan of actions designed to improve the security and enhance cyber resilience of infrastructures and services.
- 26. refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks.
- 27. Act of 2012
- 28. is a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and vulnerabilities of online access and use of the internet.
- 31. Use, production, sale, procurement, importation, distribution, or otherwise making available, without right
- 34. Acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering.
- 36. global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- 38. what comes after zettabyte.
- 40. Access Access to the whole or any part of a computer system without right
- 41. is a shortfall that comes from fragmented thinking, reactive acquisition, and unmanaged vulnerability against the known threats that violate confidentiality, integrity, availability, and privacy of information in the infrastructure, process, data, application, and agreements of service delivery.
- 44. An act defining cybercrime, providing for the prevention,
- 47. is an electronic data storage device used for storing digital information, typically using flash memory.