An employee has installed a new video editing software on their company laptop. After the installation, the IT department notices an increase in network activity and an additional toolbar in the web browser that the employee did not intentionally install. Which of the following is the BEST description of this additional software?
Potentially unwanted program (PUP)
Remote access Trojan (RAT)
|Attacks, Threats, and Vulnerabilities
|Architecture and Design
|Operations and Incident Response
|Governance, Risk, and Compliance