Your employer allows BYOD because the companies software landscape is entirely based on SaaS applications on the internet. Recently an employee's various accounts were accessed by a hacker. The user tells you they had different passwords for all of the applications. No one else has reported similar issues. After helping the user conduct a malware scan on their personnel device you find that they have malware that records input given to the PC by the user. What option best describes the type of malware found?
|Attacks, Threats, and Vulnerabilities|
|Architecture and Design|
|Operations and Incident Response|
|Governance, Risk, and Compliance|