Elastic Security #1
Across
- 2. Process of continuously checking for threats
- 5. Exploring data at a more granular level
- 9. Measure of potential impact of a threat
- 10. Observable behavior in data
- 12. Visual representation of events over time
- 13. Prioritizing incidents based on severity
- 15. Security event that may have negative consequences
- 17. Actions taken to mitigate a security incident
- 18. List of trusted entities
- 19. Label assigned to data for easier organization
- 21. Notification of a potential security threat
- 22. Finding relationships between events
- 24. Identifiable characteristic of a threat
- 25. List of untrusted entities
Down
- 1. Observable related to malicious activity
- 3. Act of searching for threats
- 4. Changing focus in data analysis
- 6. Criteria used to detect suspicious activity
- 7. Additional information about an event
- 8. Identifying malicious or suspicious activity
- 11. Adversary behaviors in the MITRE ATT&CK framework
- 14. Grouping and summarizing data
- 16. Framework for categorizing attack techniques
- 17. Likelihood and impact of a security event
- 18. Elasticsearch feature for alerting and monitoring
- 20. Deviation from normal behavior
- 23. Visual interface for data analysis