Cyber Security word search

123456
Across
  1. 3. Software designed to harm a system.
  2. 5. Unauthorized intrusion into systems for malicious intent
  3. 6. Malicious software that replicates and infects systems
Down
  1. 1. Unauthorized access to data.
  2. 2. Secret phrase for user authentication.
  3. 4. Process of converting data into code.