Module 3: Crossword Puzzle 2

1234567891011
Across
  1. 2. Acronym for a group f people in an organization responsible to respond to cyber security incidents.
  2. 3. ____ AI relies on training data to develop analysis capability, the threat actor may be able to submit tainted samples.
  3. 6. Acronym for a powerful all-in-one tool that can perform incident response and threat hunting.
  4. 7. Communication, notification, and reporting is crucial with internal and external _____
  5. 10. Facilitator presents a scenario; does not involve a live system.
  6. 11. _____ is the second item in the Cyber Kill Chain Attack Framework.
Down
  1. 1. Responders demonstrate response actions during a ____
  2. 4. Most network, OS, and security applications will have these, it is something you will want to review and audit. Can be automated or reviewed manually.
  3. 5. Isolate suspected system for analysis in a sandbox.
  4. 8. Acronym for a mechanism to identify if and when an attempt was made to extract files to an unauthorized medium.
  5. 9. An acronym for responding and recovery planning for major incidents.