cyber security

1234
Across
  1. 2. software which is specifically designed to disrupt, damage, or gain authorized access to a computer system.
  2. 4. in computing is any malicious computer program which misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it
Down
  1. 1. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  2. 3. a malware which replicates it self eating your storage its harmless when it doesn't contain a virus
  3. 4. is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.