Scenario: A user downloads what appears to be a useful software, but it begins recording their keystrokes to steal sensitive information. This software is an example of:
A team is working on defining user needs and functional specifications for a new software application. What phase of the SDLC are they currently engaged in?