Across
- 4. Wireless technology used to interconnect mobiles computers etc
- 6. Refers to unwanted bulk emails that come from unknown sources
- 7. Practice of protecting digital information
- 9. Network topology with a central hub
Down
- 1. It is a combination of two terms 'net' and 'etiquette'
- 2. The process of transforming data into an unreadable code
- 3. Type of cyber attack that tricks users
- 5. Refers to an illegal intrusion into a computer system or network
- 8. Device that connects multiple networks
