Complete the puzzle with the help of hints:

12345
Across
  1. 3. ________ programs are used to check the user’s keystrokes and get important information, such as passwords.
  2. 5. Name the act or practice of obtaining secrets from individuals, competitors, rivals, groups, governments, and enemies also for military, political, or economic advantage.
Down
  1. 1. Name the most expensive virus in the world and in cyber security history.
  2. 2. ________ are one of the most sophisticated types of crime-ware applications that perform a wide variety of automated tasks on behalf of the cyber criminals.
  3. 4. ________ hacking is done for a good cause, such as national security,etc.