Primary site
Secondary site
Tertiary site
Construction site
Transaction recovery
Database recovery
System recovery
Value recovery
Filter
Recovery
Security
Scalability
To create stronger connections with the target
To create ghost server on the network
To obtain a remote access connection
To hide malicious activity on the network
Information gateway
Crack-up password
Facilities provided
Cover-up tracks