Across
- 4. Malware that gains administrative privileges on a device to control or steal data
- 6. Malicious software designed to damage or steal information from mobile devices
- 10. A four-digit code that protects the SIM card from unauthorized use
- 13. Bluetooth attack where hackers steal data from a device with an open connection
- 14. Open-source mobile operating system developed by Google
- 16. Microsoft’s mobile operating system featuring a tile-based interface
- 18. Numeric or alphanumeric key used to unlock and secure a mobile device
- 19. Mobile operating system used exclusively on Apple devices
- 20. Accessing a phone through a previously trusted but now compromised Bluetooth connection
- 21. Unauthorized Bluetooth data theft from discoverable devices
- 22. Process of verifying a user’s identity before granting access to a system or device
- 23. Feature that locks the device automatically after a set period of inactivity
- 24. Unauthorized listening or interception of private communication like calls or chats
- 25. Process of converting readable data into an unreadable format to protect it from unauthorized access
- 26. Security app offering antivirus, privacy management, and personal guardian features
Down
- 1. Feature that tracks, locks, or erases a lost or stolen mobile device remotely
- 2. Using someone else’s unsecured Wi-Fi connection without permission
- 3. Security barrier that monitors and controls incoming and outgoing network traffic
- 5. Determines what resources an authenticated user is allowed to access
- 7. Protecting smartphones and tablets from threats, data loss, and unauthorized access
- 8. Unique identification number assigned to every mobile phone to help track or block stolen devices
- 9. Strongest encryption standard for protecting wireless networks
- 11. Type of Bluetooth attack where an attacker intercepts and alters communication between two devices
- 12. Copying important files or settings so they can be restored if data is lost or deleted
- 15. App that protects phones from malware and helps locate lost devices
- 17. Process of converting encrypted data back into its original readable form
