{"title":"网络泄露的数据恢复:更可能的灾难恢复用例。","authors":"John Beattie, Michael Shandrowski","doi":"","DOIUrl":null,"url":null,"abstract":"<p><p>To extort a ransom payment, ransomware actors must make the threat sufficiently compelling that payment seems like the only option. This is achieved by encrypting or disabling a company's data replicas and backups as well as its production data - data that are essential to the organisation's success. To prevent this happening, it is essential to extend one's thinking beyond the organisation's cyber security incident response plan and disaster recovery programme and give active consideration to a cyber incident recovery risk management (CIR-RM) programme. This paper explores what this requires, including the right thinking, the right approach, the right team and the right plan.</p>","PeriodicalId":39080,"journal":{"name":"Journal of business continuity & emergency planning","volume":"15 2","pages":"114-126"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber-compromised data recovery : The more likely disaster recovery use case.\",\"authors\":\"John Beattie, Michael Shandrowski\",\"doi\":\"\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>To extort a ransom payment, ransomware actors must make the threat sufficiently compelling that payment seems like the only option. This is achieved by encrypting or disabling a company's data replicas and backups as well as its production data - data that are essential to the organisation's success. To prevent this happening, it is essential to extend one's thinking beyond the organisation's cyber security incident response plan and disaster recovery programme and give active consideration to a cyber incident recovery risk management (CIR-RM) programme. This paper explores what this requires, including the right thinking, the right approach, the right team and the right plan.</p>\",\"PeriodicalId\":39080,\"journal\":{\"name\":\"Journal of business continuity & emergency planning\",\"volume\":\"15 2\",\"pages\":\"114-126\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of business continuity & emergency planning\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Medicine\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of business continuity & emergency planning","FirstCategoryId":"1085","ListUrlMain":"","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Medicine","Score":null,"Total":0}
Cyber-compromised data recovery : The more likely disaster recovery use case.
To extort a ransom payment, ransomware actors must make the threat sufficiently compelling that payment seems like the only option. This is achieved by encrypting or disabling a company's data replicas and backups as well as its production data - data that are essential to the organisation's success. To prevent this happening, it is essential to extend one's thinking beyond the organisation's cyber security incident response plan and disaster recovery programme and give active consideration to a cyber incident recovery risk management (CIR-RM) programme. This paper explores what this requires, including the right thinking, the right approach, the right team and the right plan.
期刊介绍:
Journal of Business Continuity & Emergency Planning is the leading professional journal publishing peer-reviewed articles and case studies written by and for business continuity and emergency managers.