Across
- 2. Blocks unauthorized access
- 6. Rules for communication
- 8. Fraud emails for personal data
- 12. Global network
- 13. Unwanted emails
- 15. Full form of Wi-Fi
- 18. Login name on a system
- 19. Unauthorized access person
- 20. Secret code
Down
- 1. Central hub in a network
- 3. Full form of LAN
- 4. Harmful software
- 5. Illegal activity using computers
- 7. Online criminal
- 9. Fake website/email to steal info
- 10. Small area network
- 11. Scrambles data to keep it safe
- 14. Group of connected devices
- 16. Unique number of a computer
- 17. Full form of URL
