CTI Crossword

12345678910
Across
  1. 4. A tool for analyzing logs for security incidents (owned by Cisco)
  2. 6. A group of indicators that define a malicious activity pattern
  3. 7. A system that monitors network traffic for malicious activity
  4. 9. Malware that locks files and demands payment
Down
  1. 1. Technique for disguising malicious activity as legitimate
  2. 2. Unauthorized access to or control over a computer system
  3. 3. An attack that overwhelms a network with traffic
  4. 5. A method of tricking users into revealing sensitive information
  5. 8. Framework for describing cyber threat information
  6. 10. Malicious software that spreads without user action