Across
- 2. Unauthorized access to data
- 4. Network security barrier
- 7. Software update to fix vulnerabilities
- 10. Fraudulent attempt to get personal information
- 11. Malicious software that demands payment
- 12. Local tribal community hosting IT services
- 15. Measures to protect information and systems
Down
- 1. Name of the tribal nation
- 3. IT support for users
- 5. Extra layer of login security
- 6. Software designed to damage or gain unauthorized access
- 8. Secret code to access accounts
- 9. Secure remote network connection
- 13. Process of converting data to unreadable format
- 14. Copy of data for recovery
