Across
- 5. Weak points in a system's security that may be exploited by cybercriminals in smart home devices.
- 6. Popular voice-controlled smart assistant which raises privacy concerns regarding the data it collects.
- 8. Security technique used to encode data sent between smart devices to prevent unauthorized access.
- 9. A deceptive method often used to steal user credentials by mimicking legitimate requests or notifications, increasingly targeted at smart device users.
- 11. A line of smart home products known for integrating security features but still poses risks if not properly managed.
Down
- 1. A device often connected to smart home networks that can be manipulated remotely, highlighting the need for secure configurations.
- 2. Unauthorized gathering of private information through electronic means in a connected home.
- 3. Residences equipped with interconnected devices that can be managed remotely but may expose owners to cyber threats
- 4. A type of malware that converts networked devices into controlled 'bots', often used in large-scale network attacks, including those on IoT devices.
- 7. Measures and protocols implemented to protect smart home devices from cyber threats.
- 10. Individuals who seek unauthorized access to networked devices, often targeting poorly secured smart home systems.
