CSCU Module 11 – Securing IoT Devices and Gaming Consoles

12345678910111213141516171819202122232425
Across
  1. 1. System that records device activity and events
  2. 3. Long and complex password used for account protection
  3. 4. Amazon's voice-controlled smart assistant
  4. 7. Internet-enabled device that collects and shares data
  5. 9. Missing protection that leaves data exposed
  6. 10. Ports left accessible that increase security risks
  7. 15. Factory-set password that cannot be changed
  8. 16. Samsung smart home control hub
  9. 17. Electronic device designed for playing video games
  10. 18. When attackers gain access without permission
  11. 19. Command word that activates a smart assistant
  12. 20. Deceptive messages used to steal login credentials
  13. 21. Fake website made to trick users into entering data
  14. 22. Updating device software to fix vulnerabilities
  15. 24. Weak or outdated parts in IoT devices
  16. 25. Network of smart devices connected to the Internet
Down
  1. 2. Google's smart AI assistant for home automation
  2. 5. Software that records every keystroke entered
  3. 6. Unauthorized release of personal data
  4. 8. Children's toys with sensors and internet connectivity
  5. 11. Central hub that controls smart devices in a home
  6. 12. Security method requiring password plus second verification
  7. 13. Attack that floods a server with traffic to make it crash
  8. 14. Audio data collected by smart assistants
  9. 23. Tool that encrypts internet traffic and hides user identity