Cyber security and mass surveillance

1234567891011
Across
  1. 3. you should not just check identity, you should also confirm
  2. 5. unauthorized use of computing resources to mine cryptocurrencies
  3. 8. information security is not just a ___ issue
  4. 9. information security officer
  5. 10. what is the purpose behind mass surveillance?
Down
  1. 1. this horse can stampede your security defenses for the bad guys and make you look sheepish tool.
  2. 2. someone who deplores cracking
  3. 4. someone who breaks into another computer system
  4. 6. when someone sends an e-mail with a link to a bogus website
  5. 7. a malicious program that modifies itself when it replicates
  6. 11. what is widely used for mass surveillance?