Across
- 1. process to identify analyze and resolve incidents
- 4. using AI to identify and block fraudulent transactions
- 7. structured framework describing stages of cyber attacks
- 12. weakness exploitable by threat actors
- 13. authorized security testing to identify vulnerabilities
- 14. gathering intelligence from human technical and open sources
- 15. verification that user or data is genuine
- 18. points where trust levels change in application
- 19. actions to investigate contain mitigate and eradicate incidents
- 20. monitoring network for abnormal or unauthorized activity
- 22. analyzing data patterns to anticipate future threats
- 25. restoring systems services and data after incident
- 28. identifying active hosts open ports services
- 30. framework for managing information security risks
- 33. collecting and combining data before exfiltration
- 34. attacker enumeration and discovery inside target network
- 35. locations where users or attackers access application
- 37. severity or impact if risk event occurs
- 38. US law requiring federal agency information security programs
- 40. uncertainty of potential damage from an adverse event
- 41. technology performing repetitive security tasks automatically
- 43. multiple security layers protecting information systems
- 44. EU regulation protecting personal data and privacy
- 45. patterns methods used by threat actors
- 46. systems and data accessible when required
- 47. chart comparing likelihood and consequence to rate risk
- 48. collecting and analyzing threat data for decisions
Down
- 2. structured process to identify application security threats
- 3. assurance sender cannot deny transmitted message
- 5. gaining higher access rights after compromise
- 6. pattern of activity showing malicious behavior
- 8. chance that a risk event will occur
- 9. unknown security flaw exploited before patch
- 10. extracting detailed system information through active queries
- 11. identifying potential attacks targets and methods before attack
- 16. collection and analysis of cyber threat data
- 17. hiding malicious traffic inside DNS requests
- 21. spotting unusual activity that may indicate attacks
- 22. security standard for organizations handling cardholder data
- 23. forensic clues suggesting intrusion or malicious activity
- 24. assurance information accessible only authorized users
- 26. initial information gathering before launching attack
- 27. preventing spread of incident to other systems
- 29. protection against unauthorized modification of data
- 31. using AI to detect botnet behavior and intrusions
- 32. layered security approach using multiple controls
- 36. misuse of scripts to automate attacks or exfiltration
- 39. remote control script placed on a web server
- 42. attempt to exploit system security weaknesses
