CYBERCRIME

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 1. any illegal action that occurs within or via the use of electronic communication networks such as the Internet.
  2. 3. an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
  3. 6. an offering that uses false or fraudulent claims to solicit investments or loans or that provides for the purchase, use, or trade of forged or counterfeit securities.
  4. 8. it is one computer is used to reprogram another for illicit purposes.
  5. 10. it is the surveillance that focuses not upon the visual or other tracking of the physical individual but of collecting, collating and analyzing data about the individual’s activity often in the form of electronic records.
  6. 17. terrorist activity that targets computer networks and information systems for attack.
  7. 19. it is a negative information is spread online about a stock driving down its price and enabling people to buy it at an artificially low price before rebuttals by the company’s officers reinflate the price.
  8. 25. the act of copying digital material posted online into the storage medium on one’s computer.
  9. 26. sexually explicit visual or written representations whose primary goal or usage is to generate sexual excitement.
  10. 27. a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
  11. 31. a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
  12. 33. an investment scheme in which investors are promised abnormally high profits on their investments.
  13. 36. a program is secretly attached to the company’s computer system.
  14. 37. an act emending certain provisions of republic act no. 8293
  15. 38. an act prescribing the intellectual property code and establishing the intellectual property office providing for its powers and fuctions and other purposes.
  16. 40. stalking that takes place via online communication mechanism such as email chat rooms instant messaging and discussion lists.
  17. 44. the right to be left alone freedom from observation and interference from others.
  18. 45. an illegally obtains data from a computer system by leaking it out in small amounts.
  19. 46. criminal acts that tend to go largely unobserved unremarked and unrecorded in official assessments and measures of criminal activity.
  20. 47. an act providing for the recognition and electronic commercial and non-commercial transactions and documents, penalties for the unlawful use thereof, and for other purposes.
  21. 48. the crime that occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
Down
  1. 1. the interactional space or environment created by linking computers together into a communication network.
  2. 2. a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
  3. 3. unauthorized access to the entire or any part of a computer system.
  4. 4. it should be charged with regular interval of time and it should be alpha numeric and should be difficult to judge.
  5. 5. It occurs when a person uses the Internet to steal someone’s identity and/or impersonate them to open a new credit card account or conduct some other financial transaction.
  6. 7. A techniques and tools for encoding or scrambling data in such a way that it is incomprehensible to those who do not have access to the key required to decode the data back into its original legible form.
  7. 9. the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
  8. 11. pieces of computer code that can infect computer system causing disruptions to their normal operation.Cyber-trespass- it is the crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
  9. 12. political activism and social protest that uses hacking tools and techniques.
  10. 13. property that takes the form of ideas expressions sign symbols designs logos and similar intangible forms.
  11. 14. a generally derogatory term used to describe activities associated with hacking in its second sense that of unauthorized access to computer systems.
  12. 15. unauthorized copying distribution or sale of informational commodities over which some party claims property rights is referred to as copyright violations.
  13. 16. these can be used to store copies of files from the computer for use in his investigation.
  14. 18. any non-public transmission of computer data to from or within a computer system intercepted by technical means without permission including electromagnetic emissions from a computer system containing such computer data.
  15. 20. the most sensitive component as prevention from cybercrime.
  16. 21. the fraudulent practice of establishing facsimiles or legitimate websites to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details credit card numbers and account passwords.
  17. 22. most computer programs used in business have built-in anti-theft safeguards.
  18. 23. an interactive technologies that allow the creation or sharing/exchange of information ideas career interests and other forms of expression via virtual communities and networks.
  19. 24. a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
  20. 28. an act regulating the issuance and use of access device prohibiting fraudulent acts committed relative thereto providing penalties and other purposes.
  21. 29. the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
  22. 30. group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network modes.
  23. 32. it is doing psychological harm to, or inciting physical harm against others thereby breaching laws relating to the protection of the person eg hate speech stalking.
  24. 34. it is a crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
  25. 35. it is generally implemented using firewalls which provide a centralized point from which to permit or allow to access.
  26. 39. unauthorized access to, and interference with a computer system the illicit and typically illegal acts associated with unauthorized access to and interference with a computer system.
  27. 41. market economic activity undertaken via the internet or similar electronic communication networks.
  28. 42. an act defining cybercrime providing for the prevention investigation supression and the imposition of penalties therefor and for other purposes.
  29. 43. repeated harassing or threatening behavior in which an offender persistently contracts follows approaches threatens or otherwise subjects a victim to unwelcome attentions.