Elastic Security #1

12345678910111213141516171819202122232425
Across
  1. 2. Process of continuously checking for threats
  2. 5. Exploring data at a more granular level
  3. 9. Measure of potential impact of a threat
  4. 10. Observable behavior in data
  5. 12. Visual representation of events over time
  6. 13. Prioritizing incidents based on severity
  7. 15. Security event that may have negative consequences
  8. 17. Actions taken to mitigate a security incident
  9. 18. List of trusted entities
  10. 19. Label assigned to data for easier organization
  11. 21. Notification of a potential security threat
  12. 22. Finding relationships between events
  13. 24. Identifiable characteristic of a threat
  14. 25. List of untrusted entities
Down
  1. 1. Observable related to malicious activity
  2. 3. Act of searching for threats
  3. 4. Changing focus in data analysis
  4. 6. Criteria used to detect suspicious activity
  5. 7. Additional information about an event
  6. 8. Identifying malicious or suspicious activity
  7. 11. Adversary behaviors in the MITRE ATT&CK framework
  8. 14. Grouping and summarizing data
  9. 16. Framework for categorizing attack techniques
  10. 17. Likelihood and impact of a security event
  11. 18. Elasticsearch feature for alerting and monitoring
  12. 20. Deviation from normal behavior
  13. 23. Visual interface for data analysis