Chapter 9
Recovery
To achieve great things, two things are needed; a plan, and not quite enough time.
—Leonard Bernstein
Learning Objectives
Understand strategies for effectively restoring operations
Learn about processes for recovering data
Reduce the risk of data loss and potential reinfection
Effectively transition from crisis mode back to a “new normal”
Cyber extortion attacks can have a negative impact on the victim’s operations, either as a direct consequence (for example, in ransomware cases) or indirectly as a result of the containment and response activities. Throughout the entire crisis, responders must keep in mind the ultimate end goal: recovery.
“Recovery” in the context of this book is the process of regaining normal functionality ...
Get Ransomware and Cyber Extortion: Response and Prevention now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.