1 | 13 | ||||||||||||||||||||
2 | |||||||||||||||||||||
14 | |||||||||||||||||||||
3/11 | |||||||||||||||||||||
4 | |||||||||||||||||||||
15 | |||||||||||||||||||||
5 | 12 | ||||||||||||||||||||
6 | |||||||||||||||||||||
7 | |||||||||||||||||||||
8 | |||||||||||||||||||||
9 | |||||||||||||||||||||
10 | |||||||||||||||||||||
1. a physical location where people can access the internet, typically using Wi-Fi
2. The process of breaking the encryption of a network to gain unauthorized access.
3. The process of verifying the identity of a user or device trying to connect to a network.
4. a unique identifier for a wireless network
5. Devices that detect physical or environmental input such as temperature, pressure, motion, or light, and convert it into an electrical signal.
6. the process of encoding information to make it secure from unauthorized access
7. the maximum amount of data that can be transmitted over a network
8. a device that forwards data packets between computer networks
9. A weakness or flaw in a system that can be exploited by attackers.
10. A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity that enables them to collect and exchange data.
11. a device that allows wireless devices to connect to a wired network
12. the power of a Wi-Fi signal, typically measured in decibels
13. A residence that has connected devices and systems which can be remotely controlled and automated to enhance comfort, convenience, and energy efficiency.
14. a wireless networking technology that allows devices to connect to the internet via a router
15. The measures taken to protect connected devices, networks, and data from unauthorized access, data breaches, or other cyber threats.