Description should include
a definition of keylogging and the type of information that can be recorded or copied
hidden keystroke logging devices
flawed encryption techniques
vulnerabilities in browsers, applications, and scripts.