Skip to main content

D3FEND

What is the corresponding name for the ID ‘D3-SDM’?

Answer

System Daemon Monitoring

 

What are the five general tactics used to classify each defensive method? (In the order they appear)

Answer

Harden, Detect, Isolate, Deceive, Evict

 

Answer

Sentinel2D3FEND

 

What does ‘File Access Pattern Analysis’ mean?

Answer

Analyzing the files accessed by a process to identify unauthorized activity.

 

What does ‘Local Resource Access’ artifact mean?

Answer

Ephemeral digital artifact comprising a request of a local resource and any response from that resource.