Across
- 3. Refers to unwanted bulk emails that come from unknown sources
- 5. The process of transforming data into an unreadable code
- 7. Device that connects multiple networks
- 10. It can be defined as the legal rules and restrictions imposed on online laws
Down
- 1. Type of cyber attack that tricks users
- 2. Wireless technology used to interconnect mobiles computers etc
- 4. Network topology with a central hub
- 6. Practice of protecting digital information
- 8. It is a combination of two terms 'net' and 'etiquette'
- 9. Refers to an illegal intrusion into a computer system or network
