CSCU Module 7 – Securing Mobile Devices

1234567891011121314151617181920212223242526
Across
  1. 4. Malware that gains administrative privileges on a device to control or steal data
  2. 6. Malicious software designed to damage or steal information from mobile devices
  3. 10. A four-digit code that protects the SIM card from unauthorized use
  4. 13. Bluetooth attack where hackers steal data from a device with an open connection
  5. 14. Open-source mobile operating system developed by Google
  6. 16. Microsoft’s mobile operating system featuring a tile-based interface
  7. 18. Numeric or alphanumeric key used to unlock and secure a mobile device
  8. 19. Mobile operating system used exclusively on Apple devices
  9. 20. Accessing a phone through a previously trusted but now compromised Bluetooth connection
  10. 21. Unauthorized Bluetooth data theft from discoverable devices
  11. 22. Process of verifying a user’s identity before granting access to a system or device
  12. 23. Feature that locks the device automatically after a set period of inactivity
  13. 24. Unauthorized listening or interception of private communication like calls or chats
  14. 25. Process of converting readable data into an unreadable format to protect it from unauthorized access
  15. 26. Security app offering antivirus, privacy management, and personal guardian features
Down
  1. 1. Feature that tracks, locks, or erases a lost or stolen mobile device remotely
  2. 2. Using someone else’s unsecured Wi-Fi connection without permission
  3. 3. Security barrier that monitors and controls incoming and outgoing network traffic
  4. 5. Determines what resources an authenticated user is allowed to access
  5. 7. Protecting smartphones and tablets from threats, data loss, and unauthorized access
  6. 8. Unique identification number assigned to every mobile phone to help track or block stolen devices
  7. 9. Strongest encryption standard for protecting wireless networks
  8. 11. Type of Bluetooth attack where an attacker intercepts and alters communication between two devices
  9. 12. Copying important files or settings so they can be restored if data is lost or deleted
  10. 15. App that protects phones from malware and helps locate lost devices
  11. 17. Process of converting encrypted data back into its original readable form