Cybercrime Investigation

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
Across
  1. 1. The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, etc.
  2. 4. Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
  3. 6. refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
  4. 8. The act of one individual harassing or intimidating another individual via the Internet.
  5. 10. Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
  6. 11. The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system: Provided, That the penalty to be imposed shall be (1) one degree higher than that provided for in Republic Act No. 9775.
  7. 12. The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
  8. 14. refers to a set of instructions executed by the computer to achieve intended results.
  9. 15. Malicious software, such as a virus or a worm, that attacks a target computer.
  10. 17. the interactional space or environment created by linking computers together into a communication net5work.
  11. 19. refers to a representation of information, knowledge, facts, concepts, or instructions which are being prepared, processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
  12. 20. refers to the modification or change, in form or substance, of an existing computer data or program.
  13. 22. A program that masks something harmful, such as a worm or virus, that it carries into a device.
  14. 23. SYSTEM The overarching program that runs all the functions on a computer or other electronic device.
  15. 24. A politically- or ideologically-motivated cyber attack or hack.
  16. 26. The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future.
  17. 27. An information packet sent from a website to a web browser that records a user’s activity on that website.
  18. 28. A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area. Administrators may require passwords be a certain length, include capital letters, numbers, or special characters, or be changed after a set length of time.
  19. 29. An online journal. Contraction of the term “web log.”
  20. 30. The access to the whole or any part of a computer system without right.
  21. 32. A camera connected to a computer, generally used to then stream videos to the Internet.
  22. 36. A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox.
  23. 39. A software robot that performs automated tasks.
  24. 40. refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, etc.
  25. 41. A unique 32-bit binary number that identifies the computer or other host being used to access the Internet.
  26. 42. refers to a computer or a computer network, the electronic medium in which online communication takes place.
  27. 43. A group of computers that is linked to share data and other information.
  28. 45. stalking that takes place via online communication mechanism such as email, chat rooms, instant messaging, and discussion lists.
  29. 48. refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
  30. 49. The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same
Down
  1. 2. A company that offers access to the Internet.
  2. 3. A location where individuals can connect to the Internet wirelessly. This may be in a larger area in a public space or a small space created by a cell phone.
  3. 5. refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
  4. 7. The opening section of an electronic message that provides information about the sender, recipients, subject, and the date and time a message was sent.
  5. 9. surveillance that focuses not upon the visual or other tracking of the physical individual, but of collecting, collating and analyzing data about the individual’s activity, often in the form of electronic records.
  6. 13. Amassed data that is used to describe large amounts of other Internet data.
  7. 16. An individual who manages and oversees a network.
  8. 17. The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right.
  9. 18. the act of copying digital material posted online into the storage medium on one’s computer.
  10. 21. A unique Internet identifier registered to an entity (e.g. whitehouse.gov).
  11. 25. refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data.
  12. 31. an attack on a networked computer or computers that disrupts normal operations to such an extent that legitimate users can no longer access their services.
  13. 33. refers to the transmission of information through ICT media, including voice, video and other forms of data.
  14. 34. The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
  15. 35. The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
  16. 37. refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system including a program suitable to cause a computer system to perform a function and includes electronic documents and/or electronic data messages whether stored in local computer systems or online.
  17. 38. The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
  18. 40. terrorist activity that targets computer networks and information systems for attack.
  19. 44. A way to access an electronic system by bypassing some or all security mechanisms.
  20. 46. ENGINE A website that finds information across the Internet based on a set of search criteria.
  21. 47. Unsolicited advertising or other information sent out via email or other messaging service.