Across
- 2. Security system controlling network traffic.
- 4. Fraudulent attempt to steal information.
- 6. Secret phrase for user authentication.
Down
- 1. Unauthorized access to data.
- 3. Process of converting data into code.
- 5. Software designed to harm a system.
