Zero-day recovery: the key to mitigating the ransomware threat

被引:0
|
作者
Fagioli A. [1 ]
机构
[1] Tectrade, United States
来源
Computer Fraud and Security | 2019年 / 2019卷 / 01期
关键词
Compendex;
D O I
10.1016/S1361-3723(19)30006-5
中图分类号
学科分类号
摘要
Combine zero-day exploits with ransomware and you have a cyberthreat that few organisations are equipped to handle. If all the focus is placed on cyber defence, what happens when those defences are breached? Financial harm, reputational damage and operational chaos commonly follow. But by bringing IT support and cyber security teams together, organisations can chart another way forward – a zero-day recovery architecture to transform ransomware from a critical business challenge to a mere irritant. Combine zero-day exploits with ransomware and you have a cyberthreat that few organisations are equipped to handle. If all the focus is placed on cyber defence, what happens when those defences are breached? Financial harm, reputational damage and operational chaos commonly follow. But by bringing IT support and cyber security teams together, organisations can chart another way forward – a zero-day recovery architecture to transform ransomware from a critical business challenge to a mere irritant, explains Alex Fagioli of Tectrade. © 2019 Elsevier Ltd
引用
收藏
页码:6 / 9
页数:3
相关论文
共 50 条
  • [31] Zero-Day Reconciliation of BitTorrent Users with Their ISPs
    Slot, Marco
    Costa, Paolo
    Pierre, Guillaume
    Rai, Vivek
    EURO-PAR 2009: PARALLEL PROCESSING, PROCEEDINGS, 2009, 5704 : 561 - 573
  • [32] Classification and online clustering of zero-day malware
    Jureckova, Olha
    Jurecek, Martin
    Stamp, Mark
    Di Troia, Fabio
    Lorencz, Robert
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (04) : 579 - 592
  • [33] A Zero-Day Cloud Timing Channel Attack
    Flowers, Robert
    IEEE ACCESS, 2022, 10 : 128177 - 128186
  • [34] Patching zero-day vulnerabilities: an empirical analysis
    Roumani, Yaman
    JOURNAL OF CYBERSECURITY, 2021, 7 (01):
  • [35] Revenue maximizing markets for zero-day exploits
    Mingyu Guo
    Guanhua Wang
    Hideaki Hata
    Muhammad Ali Babar
    Autonomous Agents and Multi-Agent Systems, 2021, 35
  • [36] Revenue Maximizing Markets for Zero-Day Exploits
    Guo, Mingyu
    Hata, Hideaki
    Babar, Ali
    PRIMA 2016: PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS, 2016, 9862 : 247 - 260
  • [37] LSR: Mitigating Zero-Day Sybil Vulnerability in Privacy-Preserving Vehicular Peer-to-Peer Networks
    Lin, Xiaodong
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 237 - 246
  • [38] Zero-Day Attack Detection using Ensemble Technique
    Wangde, Fawaz, I
    Mulay, Shivam P.
    Adhao, Rahul B.
    Pachghare, Vinod K.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05): : 551 - 557
  • [39] Defence against the dark art of zero-day attacks
    Madou M.
    Network Security, 2022, 2022 (11)
  • [40] Zero-Day Exploits Framework of Supply Chain Networks
    Khandelwal, Abhi
    Mahato, Dharmendra Prasad
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT I, 2024, 2090 : 319 - 335