PIXEL PERFECT PUZZLE

123456789
Across
  1. 4. Wireless technology used to interconnect mobiles computers etc
  2. 6. Refers to unwanted bulk emails that come from unknown sources
  3. 7. Practice of protecting digital information
  4. 9. Network topology with a central hub
Down
  1. 1. It is a combination of two terms 'net' and 'etiquette'
  2. 2. The process of transforming data into an unreadable code
  3. 3. Type of cyber attack that tricks users
  4. 5. Refers to an illegal intrusion into a computer system or network
  5. 8. Device that connects multiple networks