Final answer:
Caitlyn is using the process of decomposition to diagram the high-level functions and processes of the malware.
Step-by-step explanation:
The process that Caitlyn is using to diagram the high-level functions and processes of the malware is known as decomposition.