IoT Puzzle

123456789101112131415
Across
  1. 5. The practice of protecting internet-connected systems from cyber threats.
  2. 7. A secret or hidden way to bypass security and gain unauthorized access to a system or network.
  3. 10. A security system that monitors and controls incoming and outgoing network traffic.
  4. 11. The process of converting data into a code to prevent unauthorized access.
  5. 13. Short-range wireless technology.
  6. 15. Devices that collect and transmit real-time data from the environment.
Down
  1. 1. Malicious software designed to harm or exploit devices or networks.
  2. 2. Wireless standard for IoT connectivity.
  3. 3. Software embedded in IoT devices that controls their operations.
  4. 4. Verifying a user’s identity before granting access to a system.
  5. 5. Remote servers used for data storage & processing.
  6. 6. Connects IoT devices to the internet.
  7. 8. Wireless transmission of data.
  8. 9. Wireless communication protocol for IoT.
  9. 12. A type of cyber-attack where attackers trick users into providing sensitive information.
  10. 14. A network topology where devices connect directly and relay data to each other.