1 | 13 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4/14 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9/12 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
1. a physical location where people can access the internet, typically using Wi-Fi
2. The process of breaking the encryption of a network to gain unauthorized access.
3. a device that forwards data packets between computer networks
4. a device that allows wireless devices to connect to a wired network
5. A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity that enables them to collect and exchange data.
6. the maximum amount of data that can be transmitted over a network
7. the process of encoding information to make it secure from unauthorized access
8. A weakness or flaw in a system that can be exploited by attackers.
9. Devices that detect physical or environmental input such as temperature, pressure, motion, or light, and convert it into an electrical signal.
10. the power of a Wi-Fi signal, typically measured in decibels
11. a wireless networking technology that allows devices to connect to the internet via a router
12. The measures taken to protect connected devices, networks, and data from unauthorized access, data breaches, or other cyber threats.
13. A residence that has connected devices and systems which can be remotely controlled and automated to enhance comfort, convenience, and energy efficiency.
14. The process of verifying the identity of a user or device trying to connect to a network.
15. a unique identifier for a wireless network