Complete the puzzle with the help of hints:
Across
- 3. ________ programs are used to check the user’s keystrokes and get important information, such as passwords.
- 5. Name the act or practice of obtaining secrets from individuals, competitors, rivals, groups, governments, and enemies also for military, political, or economic advantage.
Down
- 1. Name the most expensive virus in the world and in cyber security history.
- 2. ________ are one of the most sophisticated types of crime-ware applications that perform a wide variety of automated tasks on behalf of the cyber criminals.
- 4. ________ hacking is done for a good cause, such as national security,etc.