Esc
Restore
Definition
The restore tactic is used to return the system to a better state.
Techniques
There are 12 techniques in this category, Restore.
Name | ID | Definition | Synonyms |
---|---|---|---|
Restore Access | D3-RA | Restoring an entity's access to resources. | |
- Restore Network Access | D3-RNA | Restoring a entity's access to a computer network. | |
- Restore User Account Access | D3-RUAA | Restoring a user account's access to resources. | |
- Reissue Credential | D3-RIC | Issue a new credential to a user which supercedes their old credential. | |
- Unlock Account | D3-ULA | Restoring a user account's access to resources by unlocking a locked User Account. | |
Restore Object | D3-RO | Restoring an object for an entity to access. This is the broadest class for object restoral. | |
- Restore Configuration | D3-RC | Restoring an software configuration. | |
- Restore Database | D3-RD | Restoring the data in a database. | |
- Restore Disk Image | D3-RDI | Restoring a previously captured disk image a hard drive. | |
- Restore File | D3-RF | Restoring a file for an entity to access. | |
- Restore Software | D3-RS | Restoring software to a host. | |
- Restore Email | D3-RE | Restoring an email for an entity to access. |
D3FEND™
A knowledge graph of cybersecurity countermeasures