CYBERCRIME INVESTIGATION (CROSSWORD PUZZLE)

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 3. It refers to the political activism and social protest that uses hacking tools and techniques.
  2. 5. Read-only memory is _______ memory.
  3. 7. It is the process of preservation , identification, extraction, and documentation of computer evidence which can be used by the court of law.
  4. 9. Interception made by technical means without right.
  5. 11. It is the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe
  6. 12. Method of communication that encode text character as standardized sequence of two different signal durations, called dots and dashes.
  7. 15. This act shall be known as the "Cybercrime Prevention Act of 2012".
  8. 16. The DICT law is otherwise known as ?
  9. 17. It is the interception of electronic communications in order to access information that usually involved a third party.
  10. 21. Process of converting encoded/ decrypted data in a form that is readble and understood by a human or a computer.
  11. 22. Telephone- Far sound ; _______ - Distant writing
  12. 23. Defined as a visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
  13. 27. A piece of software designed and created to update a computer program or its supporting data, to fix or improve it.
  14. 32. It is the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
  15. 35. The property that information is not made available or disclose to unauthorized individual, entities or processes.
  16. 37. A smartphone operating system developed by Google.
  17. 38. It is also called unsolicited commercial email.
  18. 39. Pieces of computer code that can infect computer system causing disruptions to their normal operation.
  19. 41. Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
  20. 44. Confidentiality- Privacy ; Availability- ______
  21. 45. Refers to any computer instructions, data, or programs that can be stored electronically and executed by computer hardware.
  22. 47. It refers to the is safeguarding of society, people, organizations and nations from risks caused by threats that exploit an interconnected digital environment of networks, services, systems, and processes .
  23. 49. It is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats.
  24. 50. Any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
Down
  1. 1. Electronic device that manipulate information , or data, perform processes , calculations and operations based on instructions provided bu software or hardware program.
  2. 2. It is the process of totally removing all traces of information in to the hard drive or computer.
  3. 4. It is the criminal practice of using social engineering and voice over IP to gain access to private personal and financial information from the public for the purpose of financial reward.
  4. 6. An application that allows the sending of message between computer users via network.
  5. 8. A systematic collection and organization of data by individuals or organizations so that it can be easily stored, retrieved, and edited for future use.
  6. 10. What key is generally used for encryption process?
  7. 13. Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
  8. 14. a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
  9. 18. This act shall be known as the "Data Privacy Act of 2012".
  10. 19. It involves identifying, identifying type of storage media, to determine the document.
  11. 20. It is an action with malicious intention to interrupt the operations of a network or steal the data, etc.
  12. 24. A generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
  13. 25. A data string used to verify the identity of a user.
  14. 26. A feature that allows other devices to share the mobile internet data of your mobile device.
  15. 28. Refers to a person who is intended by the originator to receive the electronic data message or electronic document.
  16. 29. Google – Standford University; FACEBOOK –
  17. 30. The access to the whole or any part of a computer system without right.
  18. 31. This Act shall be known as the “Intellectual Property Code of the Philippines.”
  19. 33. It is the interactional space or environment created by linking computers together into a communication network.
  20. 34. First cellphone invented in the history of electronic communication.
  21. 36. A computer worm rapidly infects computer worldwide.
  22. 40. It is the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
  23. 42. It refers to the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
  24. 43. A hidden collective internet site only accessible by specialized web browser.
  25. 46. Digital forensic process which involve physically or remotely obtaining possession of the computer data from the original digital storage media through digital forensic imaging process.
  26. 48. It is Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.