Chapter 5 - Everything Needs to Be Secured

123456789101112
Across
  1. 3. Data relating to an individual that can identify or locate them.
  2. 4. Software designed to damage, disrupt, or steal data.
  3. 7. HOMES Homes with sensors and connected devices, increasing security risks.
  4. 10. DATA Corporate data that may contain secrets or patents.
  5. 12. Ethical hacker who helps organizations strengthen their security.
Down
  1. 1. Hacker who acts with malicious intent.
  2. 2. OF UPGRADEABILITY IoT limitation where devices cannot be updated easily.
  3. 3. SECURITY Fences, guards, CCTV, and gates used to protect corporate facilities.
  4. 5. A network filtering system that blocks unauthorized access.
  5. 6. HOTSPOT A risky Wi-Fi network where traffic is not encrypted.
  6. 8. DEVICES Devices connected to the internet that collect and exchange data.
  7. 9. A secure encrypted connection used when accessing insecure networks.
  8. 11. Software that scans, detects, and removes malicious programs.