什么是勒索软件? | Microsoft 安全, accessed June 18, 2025, https://www.microsoft.com/zh-cn/security/business/security-101/what-is-ransomware
准备用于应对勒索软件攻击的备份和恢复计划 - Learn Microsoft, accessed June 18, 2025, https://learn.microsoft.com/zh-cn/security/ransomware/protect-against-ransomware-phase1
勒索病毒应急与响应手册 - 东南大学网络与信息中心, accessed June 18, 2025, https://nic.seu.edu.cn/__local/7/19/88/7E06D12FCF3476FB565A0FFE2F4_8A6E4147_135988.pdf?e=.pdf
典型勒索病毒攻击流程-洛阳师范学院信息化中心, accessed June 18, 2025, https://sites.lynu.edu.cn/xxhzx/info/1165/1207.htm
勒索病毒安全防护手册, accessed June 18, 2025, http://www.caict.ac.cn/kxyj/qwfb/ztbg/202109/P020210908503958931090.pdf
FireEye:DARKSIDE勒索软件技术分析- 安全内参| 决策者的网络安全 ..., accessed June 18, 2025, https://www.secrss.com/articles/31279
勒索病毒家族及相关事件分析 - 联软科技, accessed June 18, 2025, https://www.leagsoft.com/new-detail/1377
勒索軟體攻擊的生命週期 - Pure Storage, accessed June 18, 2025, https://www.purestorage.com/tw/knowledge/life-cycle-of-a-ransomware-attack.html
又到年底勒索病毒活跃高发期,制造业企业该如何防范以免中招?, accessed June 18, 2025, https://www.nington.com/blog-bestpractice/downloaddetail_218.shtml
数据备份和恢复:企业基本指南| Veritas, accessed June 18, 2025, https://www.veritas.com/zh/cn/information-center/data-backup-and-recovery
设计原则_卓越架构(WAF) - 阿里云文档, accessed June 18, 2025, https://help.aliyun.com/document_detail/2573842.html
什么是SaaS 备份和恢复? - IBM, accessed June 18, 2025, https://www.ibm.com/cn-zh/topics/saas-backup
中华人民共和国国家标准网络安全技术信息系统灾难恢复规范, accessed June 18, 2025, https://www.tc260.org.cn/file/2024-04-11/9994ae4a-9da8-4b90-a385-652c06ab4c19.pdf
Oracle数据库RTO、RPO和SLA规划 - NetApp, accessed June 18, 2025, https://docs.netapp.com/zh-cn/ontap-apps-dbs/oracle/oracle-dp-slas.html
证券期货业信息系统备份能力规范 - 中国证监会, accessed June 18, 2025, http://www.csrc.gov.cn/csrc/c101954/c7528845/7528845/files/%E9%99%84%E4%BB%B62%EF%BC%9A%E3%80%8A%E8%AF%81%E5%88%B8%E6%9C%9F%E8%B4%A7%E4%B8%9A%E4%BF%A1%E6%81%AF%E7%B3%BB%E7%BB%9F%E5%A4%87%E4%BB%BD%E8%83%BD%E5%8A%9B%E8%A7%84%E8%8C%83%E3%80%8B.pdf
全量备份/增量备份/差异备份说明- 散尽浮华 - 博客园, accessed June 18, 2025, https://www.cnblogs.com/kevingrace/p/6098963.html
增量备份与差异备份— 数据备份策略之间的区别 - AWS, accessed June 18, 2025, https://aws.amazon.com/cn/compare/the-difference-between-incremental-differential-and-other-backups/
备份基础之完全、增量与差异备份 - Dell, accessed June 18, 2025, https://www.dell.com/community/zh/conversations/%E6%95%B0%E6%8D%AE%E5%AD%98%E5%82%A8%E5%92%8C%E4%BF%9D%E6%8A%A4-%E8%B5%84%E6%96%99%E6%96%87%E6%A1%A3/%E5%A4%87%E4%BB%BD%E5%9F%BA%E7%A1%80%E4%B9%8B%E5%AE%8C%E5%85%A8%E5%A2%9E%E9%87%8F%E4%B8%8E%E5%B7%AE%E5%BC%82%E5%A4%87%E4%BB%BD/647f4a38f4ccf8a8de2b318f
勒索病毒应急响应自救手册 - 安全内参, accessed June 18, 2025, https://www.secrss.com/articles/6310
勒索软件恢复:全面的数据挽救指南 - Veeam, accessed June 18, 2025, https://www.veeam.com/blog/cn/ransomware-recovery-what-you-need-to-know.html
从破坏性网络攻击中恢复 - Dell, accessed June 18, 2025, https://www.delltechnologies.com/asset/zh-cn/products/storage/industry-market/recovering-business-destructive-cyber-attack.pdf
为什么数据库被勒索加密可以修复 - 帆软, accessed June 18, 2025, https://www.fanruan.com/blog/article/297167/
连续数据保护(CDP)技术详解手册 - TechTarget存储, accessed June 18, 2025, https://searchstorage.techtarget.com.cn/guide/6-24898/
Immutable Backup | Defined and Explained - Cohesity, accessed June 18, 2025, https://www.cohesity.com/glossary/immutable-backup/
MySQL全量与增量备份详解及实践 - 51CTO学堂, accessed June 18, 2025, https://edu.51cto.com/article/note/40948.html
网络存储区域数据必须具备容灾能力及特点与应用, accessed June 18, 2025, https://www.edu.cn/xxh/ji_shu_ju_le_bu/bf/200805/t20080520_297592_1.shtml
比较快照和备份| Filestore - Google Cloud, accessed June 18, 2025, https://cloud.google.com/filestore/docs/compare-snapshots-and-backups?hl=zh-cn
儲存月報第72期:從唯讀快照到不可變快照,SAN儲存陣列邁向勒索病毒防禦 - iThome, accessed June 18, 2025, https://www.ithome.com.tw/news/153489
Immutable Snapshots: Use Cases, Expert Tips, & Challenges - N2W Software, accessed June 18, 2025, https://n2ws.com/blog/immutable-snapshots
Immutable Backups: Why You Need Them and How They Work - Cloudian, accessed June 18, 2025, https://cloudian.com/guides/data-backup/immutable-backups-why-you-need-them-and-how-they-work/
How To Set Up Immutable Snapshots For Ransomware Protection - StoneFly, Inc., accessed June 18, 2025, https://stonefly.com/blog/how-to-set-up-immutable-snapshots-for-nas/
Cyber Resiliency with IBM Storage Sentinel and IBM Security - IBM Redbooks, accessed June 18, 2025, https://www.redbooks.ibm.com/redpieces/pdfs/sg248562.pdf
n2ws.com, accessed June 18, 2025, https://n2ws.com/blog/immutable-snapshots#:~:text=Safeguarding%20against%20ransomware%3A%20Ransomware%20often,data%20from%20these%20untampered%20snapshots.
IBM Storage Defender: IBM Data Management Service and IBM Data Protect - IBM Redbooks, accessed June 18, 2025, https://www.redbooks.ibm.com/redpieces/pdfs/sg248554.pdf
持续数据保护:实时保护数据| Veritas, accessed June 18, 2025, https://www.veritas.com/zh/cn/information-center/continuous-data-protection
CDP(Continuous Data Protection) | 連續資料保護- GIGABYTE 技嘉科技, accessed June 18, 2025, https://www.gigabyte.com/tw/Glossary/cdp-continuous-data-protection
徹底解析連續資料保護具體面貌 - iThome, accessed June 18, 2025, https://www.ithome.com.tw/tech/51632
CN101739313B - 一种连续数据保护和恢复方法 - Google Patents, accessed June 18, 2025, https://patents.google.com/patent/CN101739313B/zh