Chapter 5 - Everything Needs to Be Secured
Across
- 3. Data relating to an individual that can identify or locate them.
- 4. Software designed to damage, disrupt, or steal data.
- 7. HOMES Homes with sensors and connected devices, increasing security risks.
- 10. DATA Corporate data that may contain secrets or patents.
- 12. Ethical hacker who helps organizations strengthen their security.
Down
- 1. Hacker who acts with malicious intent.
- 2. OF UPGRADEABILITY IoT limitation where devices cannot be updated easily.
- 3. SECURITY Fences, guards, CCTV, and gates used to protect corporate facilities.
- 5. A network filtering system that blocks unauthorized access.
- 6. HOTSPOT A risky Wi-Fi network where traffic is not encrypted.
- 8. DEVICES Devices connected to the internet that collect and exchange data.
- 9. A secure encrypted connection used when accessing insecure networks.
- 11. Software that scans, detects, and removes malicious programs.