Zero-day recovery: the key to mitigating the ransomware threat

被引:0
|
作者
Fagioli A. [1 ]
机构
[1] Tectrade, United States
来源
Computer Fraud and Security | 2019年 / 2019卷 / 01期
关键词
Compendex;
D O I
10.1016/S1361-3723(19)30006-5
中图分类号
学科分类号
摘要
Combine zero-day exploits with ransomware and you have a cyberthreat that few organisations are equipped to handle. If all the focus is placed on cyber defence, what happens when those defences are breached? Financial harm, reputational damage and operational chaos commonly follow. But by bringing IT support and cyber security teams together, organisations can chart another way forward – a zero-day recovery architecture to transform ransomware from a critical business challenge to a mere irritant. Combine zero-day exploits with ransomware and you have a cyberthreat that few organisations are equipped to handle. If all the focus is placed on cyber defence, what happens when those defences are breached? Financial harm, reputational damage and operational chaos commonly follow. But by bringing IT support and cyber security teams together, organisations can chart another way forward – a zero-day recovery architecture to transform ransomware from a critical business challenge to a mere irritant, explains Alex Fagioli of Tectrade. © 2019 Elsevier Ltd
引用
收藏
页码:6 / 9
页数:3
相关论文
共 50 条
  • [41] A Threat-Led Approach to Mitigating Ransomware Attacks: Insights from a Comprehensive Analysis of the Ransomware Ecosystem
    Lawall, Alexander
    Beenken, Petra
    PROCEEDINGS OF THE 2024 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2024, 2024, : 210 - 216
  • [42] Detecting and Analyzing Zero-day Attacks using Honeypots
    Musca, Constantin
    Mirica, Emma
    Deaconescu, Razvan
    19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 543 - 548
  • [43] Big Data Framework for Zero-Day Malware Detection
    Gupta, Deepak
    Rani, Rinkle
    CYBERNETICS AND SYSTEMS, 2018, 49 (02) : 103 - 121
  • [44] A Hybrid Detection Approach For Zero-day Polymorphic Shellcodes
    Chen Ting
    Zhang Xiaosong
    Liu Zhi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 45 - 49
  • [45] Zero-day attack detection: a systematic literature review
    Ahmad, Rasheed
    Alsmadi, Izzat
    Alhamdani, Wasim
    Tawalbeh, Lo'ai
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (10) : 10733 - 10811
  • [46] Distributed Detection of Zero-Day Network Traffic Flows
    Miao, Yuantian
    Pan, Lei
    Rajasegarar, Sutharshan
    Zhang, Jun
    Leckie, Christopher
    Xiang, Yang
    DATA MINING, AUSDM 2017, 2018, 845 : 173 - 191
  • [47] An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities
    Albanese, Massimiliano
    Jajodia, Sushil
    Singhal, Anoop
    Wang, Lingyu
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2013, 2014, 456 : 322 - 340
  • [48] ZEKI: unsupervised zero-day exploit kit intelligence
    Suren, Emre
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2020, 28 (04) : 1859 - 1870
  • [49] An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities
    Albanese, Massimiliano
    Jajodia, Sushil
    Singhal, Anoop
    Wang, Lingyu
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 207 - 218
  • [50] Towards Probabilistic Identification of Zero-day Attack Paths
    Sun, Xiaoyan
    Dai, Jun
    Liu, Peng
    Singhal, Anoop
    Yen, John
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 64 - 72