IoT Puzzle
Across
- 5. The practice of protecting internet-connected systems from cyber threats.
- 7. A secret or hidden way to bypass security and gain unauthorized access to a system or network.
- 10. A security system that monitors and controls incoming and outgoing network traffic.
- 11. The process of converting data into a code to prevent unauthorized access.
- 13. Short-range wireless technology.
- 15. Devices that collect and transmit real-time data from the environment.
Down
- 1. Malicious software designed to harm or exploit devices or networks.
- 2. Wireless standard for IoT connectivity.
- 3. Software embedded in IoT devices that controls their operations.
- 4. Verifying a user’s identity before granting access to a system.
- 5. Remote servers used for data storage & processing.
- 6. Connects IoT devices to the internet.
- 8. Wireless transmission of data.
- 9. Wireless communication protocol for IoT.
- 12. A type of cyber-attack where attackers trick users into providing sensitive information.
- 14. A network topology where devices connect directly and relay data to each other.