Zero-day recovery: the key to mitigating the ransomware threat

被引:0
|
作者
Fagioli A. [1 ]
机构
[1] Tectrade, United States
来源
Computer Fraud and Security | 2019年 / 2019卷 / 01期
关键词
Compendex;
D O I
10.1016/S1361-3723(19)30006-5
中图分类号
学科分类号
摘要
Combine zero-day exploits with ransomware and you have a cyberthreat that few organisations are equipped to handle. If all the focus is placed on cyber defence, what happens when those defences are breached? Financial harm, reputational damage and operational chaos commonly follow. But by bringing IT support and cyber security teams together, organisations can chart another way forward – a zero-day recovery architecture to transform ransomware from a critical business challenge to a mere irritant. Combine zero-day exploits with ransomware and you have a cyberthreat that few organisations are equipped to handle. If all the focus is placed on cyber defence, what happens when those defences are breached? Financial harm, reputational damage and operational chaos commonly follow. But by bringing IT support and cyber security teams together, organisations can chart another way forward – a zero-day recovery architecture to transform ransomware from a critical business challenge to a mere irritant, explains Alex Fagioli of Tectrade. © 2019 Elsevier Ltd
引用
收藏
页码:6 / 9
页数:3
相关论文
共 50 条
  • [21] Zero-Day Attack Packet Highlighting System
    Jeong, Jang Hyeon
    Kim, Jong Beom
    Choi, Seong Gon
    2021 23RD INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT 2021): ON-LINE SECURITY IN PANDEMIC ERA, 2021, : 200 - 204
  • [22] Markets for Zero-Day Exploits: Ethics and Implications
    Egelman, Serge
    Herley, Cormac
    van Oorschot, Paul C.
    PROCEEDINGS OF THE 2013 NEW SECURITY PARADIGMS WORKSHOP (NSPW'13), 2013, : 41 - 46
  • [23] Zero-Day Attack Packet Highlighting System
    Jeong, Jang Hyeon
    Kim, Jong Beom
    Choi, Seong Gon
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 200 - 204
  • [24] Observation of Recent Microsoft Zero-Day Vulnerabilities
    Evans, Nathaniel
    Yuan, Xiaohong
    PROCEEDINGS OF THE 49TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE (ACMSE '11), 2011, : 328 - 329
  • [25] A framework for zero-day vulnerabilities detection and prioritization
    Singh, Umesh Kumar
    Joshi, Chanchala
    Kanellopoulos, Dimitris
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 164 - 172
  • [26] Zero-Day Threats Detection for Critical Infrastructures
    Nkongolo, Mike
    Tokmak, Mahmut
    SOUTH AFRICAN INSTITUTE OF COMPUTER SCIENTISTS AND INFORMATION TECHNOLOGISTS, SAICSIT 2023, 2023, 1878 : 32 - 47
  • [27] Detecting Zero-day Polymorphic Worm: A Review
    Sulieman, Sulieman Mohamed Ali
    Fadlalla, Yahia A.
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [28] Invisible and Forgotten: Zero-Day Blooms in the IoT
    Palani, Kartik
    Holt, Emily
    Smith, Sean
    2016 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2016,
  • [29] Revenue maximizing markets for zero-day exploits
    Guo, Mingyu
    Wang, Guanhua
    Hata, Hideaki
    Babar, Muhammad Ali
    AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2021, 35 (02)
  • [30] HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT
    Saurabh, Kumar
    Sharma, Vaidik
    Singh, Uphar
    Khondoker, Rahamatullah
    Vyas, Ranjana
    Vyas, O. P.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2025, 50 (02) : 1307 - 1327