Cybercrime crossword

123456789101112131415161718192021222324252627282930313233343536373839404142434445
Across
  1. 5. - to label cables, where they plug in, disks, the various parts of the computer and to write or protect disks.
  2. 7. - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
  3. 8. - legally institutionalized rights to own and control goods.
  4. 12. - a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
  5. 13. - proof of identity is an essential component to identify intruder.
  6. 14. - Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
  7. 16. - tools used to dismantle the hardware for seizure.
  8. 19. - in general is also defined as the state of being certain that adverse effects will not be caused by some agent under defined conditions.
  9. 21. - is criminal activity where services or applications in the Internet are used for or are the target of a crime, or where the Internet is the source, tool, target, or place of a crime.
  10. 22. - surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
  11. 27. - terrorist activity that targets computer networks and information systems for attack.
  12. 28. - a popular term for copyright violations- the unauthorized copying, distribution or sale of informational goods over which some party claims to possess propriety rights.
  13. 29. - Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
  14. 30. - refers to the transmission of information through ICT media, including voice, video and other forms of data.
  15. 31. - remember that often, latent prints can be taken from disks or other storage media or hardware.
  16. 32. - visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
  17. 34. - the fraudulent practice of establishing facsimiles or legitimate websites, to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details, credit card numbers and account passwords.
  18. 35. - refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.
  19. 37. - Input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
  20. 38. - pieces of computer code that can infect computer system causing disruptions to their normal operation.
  21. 40. - stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
  22. 41. - refers to the modification or change, in form or substance, of an existing computer data or program.
  23. 43. - these can be used to store copies of files from the computer for use in his investigation.
  24. 45. - the act of creative problem solving when faced with complex technical problems; the illicit and usually illegal activities associated with unauthorized access to, interference with, computer system.
Down
  1. 1. - a notoriously slippery term used to denote representations, expressions, or actions that are held to be generally offensive and thus unacceptable by society at large.
  2. 2. - Willful engagement, maintenance, control, or operation, directly or indirectly,of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system.
  3. 3. – any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
  4. 4. - They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to-face meeting without telling parents or guardians. They should remember that people online might not be who they seem.
  5. 6. - represents the definitive view of the of privacy rights, privacy principles and security measures in the personal data that are being created, collected, stored, transmitted, used, disclosed, and destroyed by an enterprise or agency.
  6. 9. - the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service. The aim of phishing is to persuade the victim to voluntarily disclose sensitive information, such as bank account and credit card details, which can then be exploited to defraud the individual concerned.
  7. 10. - an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
  8. 11. - refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
  9. 15. - property that takes the form of ideas, expressions, sign, symbols, designs, logos, and similar intangible forms.
  10. 17. - the fraud attributable to the misrepresentation of a product advertised for sale through an internet auction site or the non-delivery of merchandise or goods purchased through an internet auction site.
  11. 18. - the right to be left alone; freedom from observation and interference from others.
  12. 19. - is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats. It is controlled vulnerability in the policy, process, product, and people of digital information service delivery.
  13. 20. - Intentional alteration or reckless interference with the functioning of a computer or computer network.
  14. 23. - a generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
  15. 24. - the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe.
  16. 25. - refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
  17. 26. - those property rights associated with original expressions, be they in visual, spoken, written, audio or other forms. The possession of copyright over an expression entitles the holder to control its copying and distribution.
  18. 30. - refers to a computer or a computer network, the electronic medium in which online communication takes place
  19. 32. - They should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
  20. 33. - Repeated harassing, or threatening behavior, in which an offender persistently contracts, follows, approaches, threatens or otherwise subjects a victim to unwelcome attentions.
  21. 36. - the act of copying digital material posted online into the storage medium on one’s computer.
  22. 39. - the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
  23. 42. - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
  24. 43. - the interactional space or environment created by linking computers together into a communication net5work.
  25. 44. - refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.