This involves the analysis of malicious software code to determine its purpose, functionality and potential impact.