Cybersecurity Acronyms and Terms

12345678910111213141516171819202122232425262728
Across
  1. 1. A protocol for collecting and organizing log messages across a network.
  2. 2. The process of updating software and systems to address vulnerabilities.
  3. 4. Indicator of Compromise, data points that signal malicious activity.
  4. 7. The part of malware that performs the malicious action.
  5. 9. A record of events or actions on a system or network.
  6. 10. Remote Monitoring and Management, tools for remote administration of client systems.
  7. 11. The likelihood of a threat exploiting a vulnerability with impact.
  8. 13. Malicious software such as viruses, worms, or ransomware.
  9. 16. A one-way function to generate a fixed-size representation of data.
  10. 18. Isolating suspicious files or processes to prevent harm to systems.
  11. 20. Mean Time to Detect, the average time to identify a security incident.
  12. 23. Mean Time to Respond, the average time to respond to and remediate an incident.
  13. 24. A vulnerability unknown to the vendor, exploited before a fix is available.
  14. 27. A security event compromising the confidentiality, integrity, or availability of information.
Down
  1. 1. Isolating suspicious files or programs to observe their behavior.
  2. 3. Command and Control infrastructure used by attackers to communicate with compromised systems.
  3. 5. Security Operations Center, a centralized team for monitoring and responding to security incidents.
  4. 6. A network security device that monitors and filters incoming and outgoing traffic.
  5. 7. A social engineering attack to steal sensitive information via deceptive emails or websites.
  6. 8. Data Loss Prevention, tools to prevent data exfiltration.
  7. 12. A potential cause of an incident that could harm a system or organization.
  8. 14. Endpoint Detection and Response, tools for endpoint threat detection and response.
  9. 15. Virtual Private Network, encrypting data over untrusted networks.
  10. 17. Security Information and Event Management, a tool for log aggregation and analysis.
  11. 19. Advanced Persistent Threat, a sophisticated and long-term cyber attack.
  12. 21. Tactics, Techniques, and Procedures used by threat actors.
  13. 22. Demilitarized Zone, a subnet adding security for external-facing services.
  14. 25. A method used to take advantage of vulnerabilities.
  15. 26. Open Source Intelligence, information gathered from publicly available sources.
  16. 28. Cloud Access Security Broker, tools that enforce security policies for cloud services.