Post

D3FEND

We’re going to need a lot of it D3FEND Matrix

image

What is the corresponding name for the ID ‘D3-SDM’? (2 points)

image

System Daemon Monitoring

What are the five general tactics used to classify each defensive method? (In the order they appear) (2 points)

here it is ~

image

Decieve, Detect, Evict, Harden, Isolate

The open source project is probably on github, GG dork try its .-.

image

Sentinel2D3FEND

What does ‘File Access Pattern Analysis’ mean? (2 points)

so easy

image

Analyzing the files accessed by a process to identify unauthorized activity.

What does ‘Local Resource Access’ artifact mean? (2 points)

image

Ephemeral digital artifact comprising a request of a local resource and any response from that resource.

goodbye, thank you for reading until now //~//

This post is licensed under CC BY 4.0 by the author.