Illegal access to a computer system is known as _____ . _____ are programs that self-replicate and are designed to disrupt computer systems. _____ is where a user is sent legitimate looking emails; as soon as the email is opened and the recipient clicks on the embedded link, they are sent to a fake website. Software that monitors key presses on a user's keyboard, and relays the information back to the person who sent the software, is known as _____ .
A. Phishing
B. Hacking
C. Spyware
D. Viruses
Choose the correct answer from the options given below: