Cybercrime Crossword Puzzle

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
Across
  1. 3. is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
  2. 11. is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
  3. 12. is an ethical computer hacker or a computer security expert who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
  4. 13. is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
  5. 17. is an electronic data storage device used for storing digital information typically using flash memory.
  6. 19. includes the vast network of highways connecting bridges and tunnels railways utilities and buildings necessary to maintain normalcy in daily life.
  7. 22. a programmable electronic device designed to accept data perform prescribed mathematical and logical operations at high speed and display the results of these operations.
  8. 23. is digital service infrastructure has to be designed built integrated operated and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
  9. 24. when individual handling personal information knowingly or negligently disposed discard or abandon in an area accessible to the public or has otherwise placed the
  10. 27. Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
  11. 29. a string of characters that allows access to a computer system or service.
  12. 30. Intentional alteration or reckless interference with the functioning of a computer or computer network.
  13. 31. It is offense against the confidentiality integrity and availability of computer data and systems.
  14. 33. It is when an individual handling personal information or intentional knowingly and unlawfully or violating data confidentiality breach and security.
  15. 36. Breach It is when an individual or entity who has knowledge of a security breach and of the obligation.
  16. 39. is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
  17. 41. is a data storage device that includes flash memory with an integrated USB interface.
  18. 44. Intentional or reckless alteration damaging deletion of computer data.
  19. 45. what comes after terabyte
  20. 46. is a concept describing a widespread interconnected digital technology.
  21. 48. A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox
  22. 49. Interception made by technical means without right.
Down
  1. 1. It is when an individual or entity discloses to third party personal information.
  2. 2. is a hacker who violates computer security for their own personal profit or out of malice.
  3. 4. is a suspected attempted successful or imminent threat of unauthorized access use disclosure breach modification or destruction of information interference with information technology operations or significant violation of responsible use policy.
  4. 5. is data that describes other data.
  5. 6. protection of computer systems and networks from information disclosure theft of or damage to their hardware software or electronic data as well as from the disruption or misdirection of the services they provide.
  6. 7. what comes after zettabyte.
  7. 8. is a form of phishing that uses mobile phones as the attack platform to gather personal details like SSN or credit card number.
  8. 9. protecting information or hiding its meaning by converting it into a secret code before sending it out over a public network
  9. 10. the process of converting encrypted information back into normal, understandable text.
  10. 14. sexual arousal using computer technology especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
  11. 15. Acquisition of a domain name over the internet in bad faith to profit mislead destroy reputation and deprive others from registering.
  12. 16. It is when an individual or entity with malice or in bad faith.
  13. 18. Generally used to refer to someone who gains access to a system, software, or hardware without permission
  14. 20. is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device steals sensitive information and internet usage data and relays it to advertiser’s data firms or external users.
  15. 21. is pornography that exploits children for sexual stimulation
  16. 25. is a form of bullying or harassment using electronic means.
  17. 26. is a specific aspect of broader concepts such as cybersecurity and computer security being focused on the specific threats and vulnerabilities of online access and use of the internet.
  18. 28. measures promoting the safe usage of the internet especially in order to protect against viruses fraud or other forms of attack.
  19. 29. information of an individual in any container for trash collection.
  20. 32. is the World Wide Web content that exists on darkness overlay networks that use the Internet but require specific software configurations or authorization to access.
  21. 34. 10175 An act defining cybercrime providing for the prevention.
  22. 35. is a shortfall that comes from fragmented thinking reactive acquisition and unmanaged vulnerability against the known threats that violate confidentiality, integrity availability and privacy of information in the infrastructure, process data application and agreements of service delivery.
  23. 37. Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
  24. 38. refers to activities that seek to compromise digital devices such as computers smartphones tablets and even entire networks.
  25. 40. global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
  26. 42. Access to the whole or any part of a computer system without right.
  27. 43. Malicious software, such as a virus or a worm, that attacks a target computer.
  28. 47. an application that allows the sending of messages between computer users via a network.