Cyber Security

12345
Across
  1. 3. Malware designed to appear as legitimate software program to gain access to a system
  2. 4. Vital Information Resource Under ___
Down
  1. 1. Routing that uses multi-layered encryption for anonymity
  2. 2. Software that is intentionally harmful to computer
  3. 5. First computer virus