Cybersecurity Month

123456789101112131415
Across
  1. 2. Unauthorized access to data
  2. 4. Network security barrier
  3. 7. Software update to fix vulnerabilities
  4. 10. Fraudulent attempt to get personal information
  5. 11. Malicious software that demands payment
  6. 12. Local tribal community hosting IT services
  7. 15. Measures to protect information and systems
Down
  1. 1. Name of the tribal nation
  2. 3. IT support for users
  3. 5. Extra layer of login security
  4. 6. Software designed to damage or gain unauthorized access
  5. 8. Secret code to access accounts
  6. 9. Secure remote network connection
  7. 13. Process of converting data to unreadable format
  8. 14. Copy of data for recovery