ITSS Cup: Mission Possible Edition

1234567891011
Across
  1. 2. Hidden entry point for agents and attackers.
  2. 5. Digital notebook for mission intel.
  3. 7. Spy proof your data with this.
  4. 10. Security layer that acts like a force field.
  5. 11. Agent's secure communication channel.
Down
  1. 1. Controlled access to classified files.
  2. 3. Command line for missions.
  3. 4. Security alerter from mission control.
  4. 6. First agent in the ITSS organization.
  5. 8. Mission Impossible version of turn it off and on again.
  6. 9. Encrypted message scrambling algorithm.
  7. 11. Double agent that looks safe.