Q

Define and discuss malware analysis, and the primary motive for conducting malware analysis

Home, - Define and discuss malware analysis

Question - The number of cyber-attacks is increasing substantially. Cyber-attacks target government, military, public and private sector, and focus on individuals and organizations to extract valuable information.

i) Comment on the role of malware in cyber-attacks.

ii) Define and discuss malware analysis, and the primary motive for conducting malware analysis.

iii) Why must malware analysis be conducted in an isolated environment? Justify your answer.

iv) Define and evaluate the classification techniques for malware analysis.

Answer -

1) Malware are used in cyber attack in order to track the personal data of the victims. The sensitive information of the victim such as the credit card information of the victim, bank account information of the victim and many more. The use of malware forms the surface for the attacker to pursue the attacks.

2) The process and the purpose of the suspicious file or URL is conducted with the help of the malware analysis. The hidden factors of the compromise can be tracked with the help of malware analysis. The efficiency of the system can be improved with the help of the malware analysis. The primary motive of conducting the malware analysis is uncovering of the unknown and targeted threats related to system.

3) It must be conducted in isolated environment because if it is conducted in production systems then, the it may affect the working of the system and data of the system can get damaged.

4) There are three classification techniques for malware analysis.

Static analysis: The analysis which is conducted without the running of the application is known as the static analysis.

Dynamic analysis: The technique in which behavior of the malware is analyzed after running it in the sandbox is known as dynamic analysis.

Hybrid analysis: This analysis is the combination of the static and the dynamic analysis and the best features of both the analysis can be accessed by the security team in this analysis.


Leave a comment


       
Captcha

Related :-