CYBERCY INVESTIGATION (CROSSWORD PUZZLE)

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 4. Telephone- Far sound ; _______ - Distant writing
  2. 8. It is the interception of electronic communications in order to access information that usually involved a third party.
  3. 9. Interception made by technical means without right.
  4. 10. Defined as a visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
  5. 15. This act shall be known as the "Data Privacy Act of 2012".
  6. 16. It is the process of totally removing all traces of information in to the hard drive or computer.
  7. 17. Google – Standford University; FACEBOOK –
  8. 21. It is the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
  9. 26. Refers to any computer instructions, data, or programs that can be stored electronically and executed by computer hardware.
  10. 27. The property that information is not made available or disclose to unauthorized individual, entities or processes.
  11. 29. It is the social, economic, political and cultural process in which local and national spatial limits on interaction are overcome, and thus come to span the globe
  12. 31. It is the interactional space or environment created by linking computers together into a communication network.
  13. 32. It is an action with malicious intention to interrupt the operations of a network or steal the data, etc.
  14. 33. Process of converting encoded/ decrypted data in a form that is readble and understood by a human or a computer.
  15. 35. A computer worm rapidly infects computer worldwide.
  16. 36. A smartphone operating system developed by Google.
  17. 42. This act shall be known as the "Cybercrime Prevention Act of 2012".
  18. 43. It is the process of preservation , identification, extraction, and documentation of computer evidence which can be used by the court of law.
  19. 44. A piece of software designed and created to update a computer program or its supporting data, to fix or improve it.
  20. 45. It refers to the is safeguarding of society, people, organizations and nations from risks caused by threats that exploit an interconnected digital environment of networks, services, systems, and processes .
  21. 47. Digital forensic process which involve physically or remotely obtaining possession of the computer data from the original digital storage media through digital forensic imaging process.
  22. 48. It refers to the political activism and social protest that uses hacking tools and techniques.
Down
  1. 1. What key is generally used for encryption process?
  2. 2. It is an assurance that comes from a proactive and standard-based identification and detection, and an integrated protection and response against varied threats.
  3. 3. First cellphone invented in the history of electronic communication.
  4. 5. It refers to the publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
  5. 6. It involves identifying, identifying type of storage media, to determine the document.
  6. 7. A generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
  7. 10. It is the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
  8. 11. Refers to a person who is intended by the originator to receive the electronic data message or electronic document.
  9. 12. Techniques and tools associated with encoding or scrambling data in such a way as to render it incomprehensible to others not in possession of a key that is needed to decipher the data into its original legible form.
  10. 13. It is also called unsolicited commercial email.
  11. 14. Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system.
  12. 18. a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
  13. 19. Confidentiality- Privacy ; Availability- ______
  14. 20. A hidden collective internet site only accessible by specialized web browser.
  15. 22. It is the criminal practice of using social engineering and voice over IP to gain access to private personal and financial information from the public for the purpose of financial reward.
  16. 23. A systematic collection and organization of data by individuals or organizations so that it can be easily stored, retrieved, and edited for future use.
  17. 24. Read-only memory is _______ memory.
  18. 25. The DICT law is otherwise known as ?
  19. 28. Any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
  20. 30. It is Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
  21. 31. Electronic device that manipulate information , or data, perform processes , calculations and operations based on instructions provided bu software or hardware program.
  22. 34. An application that allows the sending of message between computer users via network.
  23. 37. A feature that allows other devices to share the mobile internet data of your mobile device.
  24. 38. Pieces of computer code that can infect computer system causing disruptions to their normal operation.
  25. 39. Method of communication that encode text character as standardized sequence of two different signal durations, called dots and dashes.
  26. 40. The access to the whole or any part of a computer system without right.
  27. 41. A data string used to verify the identity of a user.
  28. 46. This Act shall be known as the “Intellectual Property Code of the Philippines.”