Across
- 1. System that records device activity and events
- 3. Long and complex password used for account protection
- 4. Amazon's voice-controlled smart assistant
- 7. Internet-enabled device that collects and shares data
- 9. Missing protection that leaves data exposed
- 10. Ports left accessible that increase security risks
- 15. Factory-set password that cannot be changed
- 16. Samsung smart home control hub
- 17. Electronic device designed for playing video games
- 18. When attackers gain access without permission
- 19. Command word that activates a smart assistant
- 20. Deceptive messages used to steal login credentials
- 21. Fake website made to trick users into entering data
- 22. Updating device software to fix vulnerabilities
- 24. Weak or outdated parts in IoT devices
- 25. Network of smart devices connected to the Internet
Down
- 2. Google's smart AI assistant for home automation
- 5. Software that records every keystroke entered
- 6. Unauthorized release of personal data
- 8. Children's toys with sensors and internet connectivity
- 11. Central hub that controls smart devices in a home
- 12. Security method requiring password plus second verification
- 13. Attack that floods a server with traffic to make it crash
- 14. Audio data collected by smart assistants
- 23. Tool that encrypts internet traffic and hides user identity
