Networking concepts and Cyber ethics

1234567891011121314
Across
  1. 2. an illegal intrusion into a computer system or network
  2. 4. a network topology with a central server as a hub
  3. 6. unwanted bulk emails that come from unknown sources
  4. 9. a computer network mainly created for an individual user
  5. 10. a network topology where all nodes are connected to each other
  6. 13. a wireless technology used to interconnect devices using short range wireless connection
  7. 14. an act of harming, harassing or targeting a person using the internet in a deliberate manner
Down
  1. 1. a program or a set of instruction that disrupts the normal functioning of a computer
  2. 3. it is a malicious technique of tricking a web user into clicking something different what the user is perceives he is clicking on
  3. 5. a network topology where all nodes are connected in circular manner
  4. 7. a device which enables you to connect your computer to the available internet connection
  5. 8. certain set of rules that determines how data should be transmitted over network
  6. 9. a type of cyber attack that uses deception to trick individuals into revealing sensitive information like passwords, financial details, or credit card numbers
  7. 11. a network device to connect all computers in a network
  8. 12. the computers in a network that communicate with each other