I made this using crosswordlabs and google

1234567891011
Across
  1. 2. the repeated use of electronic communication technology—like cell phones, computers, tablets, and social media—to harass, threaten, humiliate, or target another person
  2. 3. a cybersecurity professional who uses their hacking skills to identify and exploit security vulnerabilities in computer systems without the permission of the system owner and with malicious intent
  3. 4. any data that can be used to distinguish, trace, or identify a specific individual
  4. 7. any data that can be used to distinguish, trace, or identify a specific individual
  5. 9. a cybersecurity professional who uses their hacking skills to identify and exploit security vulnerabilities in computer systems with the permission of the system owner
  6. 10. an IT professional who installs, maintains, monitors, and troubleshoots computer networks to ensure they operate efficiently, reliably, and securely
  7. 11. facts and statistics collected together for reference or analysis.
Down
  1. 1. the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally.
  2. 2. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  3. 5. a structured set of data held in a computer, especially one that is accessible in various ways.
  4. 6. search for and publish private or identifying information about (a particular individual) on the internet, typically with malicious intent.
  5. 8. a cybersecurity professional who uses their hacking skills to identify and exploit security vulnerabilities in computer systems without the permission of the system owner and without malicious intent