Which of the following is a type of malware that disguises itself as or embeds itself within legitimate software with the intent to carry out malicious actions once executed on a host system?
|Attacks, Threats, and Vulnerabilities
|Architecture and Design
|Operations and Incident Response
|Governance, Risk, and Compliance