Tactics
Techniques
Countermeasures
Countermeasures
Space Segment Cybersecurity Profile
NIST References
ISO IEC 27001
NASA Best Practice Guide
D3FEND
Tactics
Technqiues
Artifacts
Resources
General Information
Getting Started
FAQ
Working with SPARTA
Updates
SPARTA Versions
Contribute
Related Work
Spacecraft Functional Decomposition
Defense-in-Depth Space Systems
Threat Levels
Threats
Risk Assessment
Cybersecurity Protections for
Spacecraft: A Threat Based
Approach (pdf)
Tools
Navigator
Countermeasure Mapper
Control Mapper
Spacecraft Mapper
JSON Creator
Notional Risk Scores
Search
TACTICS
D3FEND
Model
Harden
Detect
Isolate
Deceive
Evict
Home
D3FEND Tactics
Evict
Evict
The eviction tactic is used to remove an adversary from a computer network.
Informational References
https://d3fend.mitre.org/tactic/d3f:Evict/
Techniques
ID
Name
Description
D3-FEV
File Eviction
File eviction techniques evict files from system storage.
D3-FR
File Removal
The file removal technique deletes malicious artifacts or programs from a computer system.
D3-ER
Email Removal
The email removal technique deletes email files from system storage.
D3-CE
Credential Eviction
Credential Eviction techniques disable or remove compromised credentials from a computer network.
D3-AL
Account Locking
The process of temporarily disabling user accounts on a system or domain.
D3-ANCI
Authentication Cache Invalidation
Removing tokens or credentials from an authentication cache to prevent further user associated account accesses.
D3-CR
Credential Revoking
Deleting a set of credentials permanently to prevent them from being used to authenticate.
D3-PE
Process Eviction
Process eviction techniques terminate or remove running process.
D3-PT
Process Termination
Terminating a running application process on a computer system.
D3-PS
Process Suspension
Suspending a running process on a computer system.
×