Across
- 3. Malware designed to appear as legitimate software program to gain access to a system
- 4. Vital Information Resource Under ___
Down
- 1. Routing that uses multi-layered encryption for anonymity
- 2. Software that is intentionally harmful to computer
- 5. First computer virus
