PIXEL PERFECT PUZZLE

12345678910
Across
  1. 3. Refers to unwanted bulk emails that come from unknown sources
  2. 5. The process of transforming data into an unreadable code
  3. 7. Device that connects multiple networks
  4. 10. It can be defined as the legal rules and restrictions imposed on online laws
Down
  1. 1. Type of cyber attack that tricks users
  2. 2. Wireless technology used to interconnect mobiles computers etc
  3. 4. Network topology with a central hub
  4. 6. Practice of protecting digital information
  5. 8. It is a combination of two terms 'net' and 'etiquette'
  6. 9. Refers to an illegal intrusion into a computer system or network