Tactics
Techniques
Countermeasures
Countermeasures
NIST References
ISO IEC 27001
D3FEND
Tactics
Technqiues
Artifacts
Resources
General Information
Getting Started
FAQ
Working with SPARTA
Updates
SPARTA Versions
Contribute
Related Work
Defense-in-Depth Space Systems
Threat Levels
Threats
Risk Assessment
Cybersecurity Protections for
Spacecraft: A Threat Based
Approach (pdf)
Search
Currently viewing SPARTA v1.4.
Learn more about the versioning system
or
see the live site
.
TACTICS
D3FEND
Model
Harden
Detect
Isolate
Deceive
Evict
Home
D3FEND Tactics
Evict
Evict
The eviction tactic is used to remove an adversary from a computer network.
Informational References
https://d3fend.mitre.org/tactic/d3f:Evict/
Techniques
ID
Name
Description
D3-FEV
File Eviction
File eviction techniques evict files from system storage.
D3-FR
File Removal
The file removal technique deletes malicious artifacts or programs from a computer system.
D3-ER
Email Removal
The email removal technique deletes email files from system storage.
D3-CE
Credential Eviction
Credential Eviction techniques disable or remove compromised credentials from a computer network.
D3-AL
Account Locking
The process of temporarily disabling user accounts on a system or domain.
D3-ANCI
Authentication Cache Invalidation
Removing tokens or credentials from an authentication cache to prevent further user associated account accesses.
D3-CR
Credential Revoking
Deleting a set of credentials permanently to prevent them from being used to authenticate.
D3-PE
Process Eviction
Process eviction techniques terminate or remove running process.
D3-PT
Process Termination
Terminating a running application process on a computer system.
D3-PS
Process Suspension
Suspending a running process on a computer system.
×