1 | 11 | 14 | |||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | 12 | ||||||||||||||||||||||||
4 | 5 | ||||||||||||||||||||||||
10 | 6 | ||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
8 | 7 | ||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
1. A residence that has connected devices and systems which can be remotely controlled and automated to enhance comfort, convenience, and energy efficiency.
2. A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity that enables them to collect and exchange data.
3. The process of breaking the encryption of a network to gain unauthorized access.
4. The measures taken to protect connected devices, networks, and data from unauthorized access, data breaches, or other cyber threats.
5. the power of a Wi-Fi signal, typically measured in decibels
6. Devices that detect physical or environmental input such as temperature, pressure, motion, or light, and convert it into an electrical signal.
7. A weakness or flaw in a system that can be exploited by attackers.
8. a wireless networking technology that allows devices to connect to the internet via a router
9. a physical location where people can access the internet, typically using Wi-Fi
10. the maximum amount of data that can be transmitted over a network
11. a device that forwards data packets between computer networks
12. a device that allows wireless devices to connect to a wired network
13. the process of encoding information to make it secure from unauthorized access
14. The process of verifying the identity of a user or device trying to connect to a network.