Online state
Off-line state
Restoring state
Deleting state
Primary site
Secondary site
Tertiary site
Construction site
Transaction recovery
Database recovery
System recovery
Value recovery
Filter
Recovery
Security
Scalability
To create stronger connections with the target
To create ghost server on the network
To obtain a remote access connection
To hide malicious activity on the network