Security homes and Security

1234567891011
Across
  1. 5. Weak points in a system's security that may be exploited by cybercriminals in smart home devices.
  2. 6. Popular voice-controlled smart assistant which raises privacy concerns regarding the data it collects.
  3. 8. Security technique used to encode data sent between smart devices to prevent unauthorized access.
  4. 9. A deceptive method often used to steal user credentials by mimicking legitimate requests or notifications, increasingly targeted at smart device users.
  5. 11. A line of smart home products known for integrating security features but still poses risks if not properly managed.
Down
  1. 1. A device often connected to smart home networks that can be manipulated remotely, highlighting the need for secure configurations.
  2. 2. Unauthorized gathering of private information through electronic means in a connected home.
  3. 3. Residences equipped with interconnected devices that can be managed remotely but may expose owners to cyber threats
  4. 4. A type of malware that converts networked devices into controlled 'bots', often used in large-scale network attacks, including those on IoT devices.
  5. 7. Measures and protocols implemented to protect smart home devices from cyber threats.
  6. 10. Individuals who seek unauthorized access to networked devices, often targeting poorly secured smart home systems.