Mots Croisés Identify the threatVersion en ligne A computer system can be prone to various threats. Identify the threats described in this crossword puzzle. par Sam Cefai 1 At first glance it will appear to be useful software but will actually do damage once installed or run on your computer. Has it roots tied to mythology. 2 A _ _ _ _ is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted 3 Any software that covertly gathers user information through the user\'s Internet connection without his or her knowledge, usually for advertising purposes. 4 A person who gains unauthorized access to a computer system. 5 A _ _ _ _ attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. 6 A _ _ _ _ can spread from computer to computer; it has the capability to travel without any human action. 5 2 4 6 1