Computer Science, asked by bigdaddyjoni213, 1 year ago

Describe the process of Reverse Engineering.

Answers

Answered by SmartCutiePie
2
The process of duplicating an existing component, subassembly, or product, without the aid of drawings, documentation, or computer model is known asreverse engineering. Reverse engineering can be viewed as theprocess of analyzing a system to: Identify the system's components and their interrelationships.

The reasons and goals for obtaining such information vary widely from everyday or socially beneficial actions, to criminal actions, depending upon the situation. Often no intellectual property rights are breached, such as when a person or business cannot recollect how something was done, or what something does, and needs to reverse engineer it to work it out for themselves. Reverse engineering is also beneficial in crime prevention, where suspected malware is reverse engineered to understand what it does, and how to detect and remove it, and to allow computers and devices to work together ("interoperate") and to allow saved files on obsolete systems to be used in newer systems. By contrast, reverse engineering can also be used to "crack" software and media to remove their copy protection,[1]:5 or to create a (possibly improved) copy or even a knockoff; this is usually the goal of a competitor.[1]:4

Reverse engineering has its origins in the analysis of hardware for commercial or military advantage.[2]:13 However, the reverse engineering process in itself is not concerned with creating a copy or changing the artifact in some way; it is only an analysis in order to deduce design features from products with little or no additional knowledge about the procedures involved in their original production.[2]:15 In some cases, the goal of the reverse engineering process can simply be a redocumentation of legacy systems.[2]:15[3]Even when the product reverse engineered is that of a competitor, the goal may not be to copy them, but to perform competitor analysis.[4] Reverse engineering may also be used to create interoperable products; despite some narrowly tailored US and EU legislation, the legality of using specific reverse engineering techniques for this purpose has been hotly contested in courts worldwide for more than two decades.


Thanku

MARK AS BRAIN LIEST PLS
Similar questions