Lecture 1 Flashcards

1
Q

What do we use as the identifier for malware?

A

Not useful to use filename as an identifier. Better to use the file hash (MD5, SHA1, SHA256) as the identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why should you be weary of online scanners?

A

You could be uploading sensitive onto the internet. These scanners may store the files. No detection does not mean no malware. Use a hash based file identifier when using online scanners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are structured files?

A

The files have a defined structure, such as the header, the data section, the footer etc. The meaning of data changes depending on where it is in the file. For us this also mean, we can look at certain sections of structured files to gain more information about it. Eg, .exe, .pdf, .png etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are unstructured files?

A

No defined structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly