Across
- 3. you should not just check identity, you should also confirm
- 5. unauthorized use of computing resources to mine cryptocurrencies
- 8. information security is not just a ___ issue
- 9. information security officer
- 10. what is the purpose behind mass surveillance?
Down
- 1. this horse can stampede your security defenses for the bad guys and make you look sheepish tool.
- 2. someone who deplores cracking
- 4. someone who breaks into another computer system
- 6. when someone sends an e-mail with a link to a bogus website
- 7. a malicious program that modifies itself when it replicates
- 11. what is widely used for mass surveillance?
