Across
- 3. Software designed to harm a system.
- 5. Unauthorized intrusion into systems for malicious intent
- 6. Malicious software that replicates and infects systems
Down
- 1. Unauthorized access to data.
- 2. Secret phrase for user authentication.
- 4. Process of converting data into code.
