The Critical Role of Disaster Recovery in Mitigating Ransomware and Advanced Persistent Threats

Authors

  • Dimas Nugroho Department of Computer Science and Electronics, Universitas Gadjah Mada (UGM), Yogyakarta, Indonesia
  • Ayu Kartika Dewi Department of Computer Science and Electronics, Universitas Gadjah Mada (UGM), Yogyakarta, Indonesia

Abstract

In an era marked by escalating cyber threats, ransomware attacks and Advanced Persistent Threats (APTs) pose significant risks to organizational continuity and data integrity. This article explores the critical role of disaster recovery (DR) strategies in mitigating the impact of these sophisticated cyberattacks. By examining key components such as backup resilience, rapid restoration, and proactive incident response, we highlight how robust disaster recovery frameworks serve as a vital line of defense against data loss and prolonged operational downtime. The discussion underscores the importance of integrating DR planning with cybersecurity measures to enhance organizational preparedness, reduce recovery time objectives (RTO), and maintain business resilience. Through real-world examples and best practices, this article provides actionable insights for IT leaders aiming to safeguard their infrastructure against the evolving landscape of ransomware and APTs.

References

Jena, Jyotirmay. (2023). BUILDING RESILIENCE AGAINST MODERN CYBER THREATS THE IMPORTANCE OF BCP AND DR STRATEGIES. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY. 14. 279-292. 10.34218/IJCET_14_02_026.

Babu, TD Mohan. "Exploring Cisco MDS Fabric Switches for Storage Networking." (2015).

Kotha, N. R. (2020). Network Segmentation as a Defense Mechanism for Securing Enterprise Networks. Turkish Journal of Computer and Mathematics Education, 11(3), 3023-3030.

Sivasatyanarayanareddy, Munnangi (2019). Best Practices for Implementing Robust Security Measures. Turkish Journal of Computer and Mathematics Education 10 (2):2032-2037.

Kolla, S. (2020). Kubernetes on database: Scalable and resilient database management. International Journal of Advanced Research in Engineering and Technology, 11(9), 1394-1404.

Vangavolu, S. V. (2023). Deep dive into Angular's change detection mechanism. International Journal of Computer Engineering and Technology, 14(1), 89–99. https://doi.org/10.34218/IJCET_14_01_010

Goli, V. R. (2015). The evolution of mobile app development: Embracing cross-platform frameworks. International Journal of Advanced Research in Engineering and Technology, 6(11), 99-111.

Rachakatla, S. K., Ravichandran, P., & Machireddy, J. R. (2021). The Role of Machine Learning in Data Warehousing: Enhancing Data Integration and Query Optimization. Journal of Bioinformatics and Artificial Intelligence, 1(1), 82-103.

Rele, M., & Patil, D. (2022, July). RF Energy Harvesting System: Design of Antenna, Rectenna, and Improving Rectenna Conversion Efficiency. In 2022 International Conference on Inventive Computation Technologies (ICICT) (pp. 604-612). IEEE.

Rele, M., & Patil, D. (2023, September). Prediction of Open Slots in Bicycle Parking Stations Using the Decision Tree Method. In 2023 Third International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS) (pp. 6-10). IEEE.

Machireddy, J. R. (2021). Architecting Intelligent Data Pipelines: Utilizing Cloud-Native RPA and AI for Automated Data Warehousing and Advanced Analytics. African Journal of Artificial Intelligence and Sustainable Development, 1(2), 127-152.

Downloads

Published

2024-12-30

How to Cite

Nugroho, D., & Dewi, A. K. (2024). The Critical Role of Disaster Recovery in Mitigating Ransomware and Advanced Persistent Threats. American Journal of Technology Advancement, 1(8), 91–97. Retrieved from https://semantjournals.org/index.php/AJTA/article/view/970