Across
- 4. A tool for analyzing logs for security incidents (owned by Cisco)
- 6. A group of indicators that define a malicious activity pattern
- 7. A system that monitors network traffic for malicious activity
- 9. Malware that locks files and demands payment
Down
- 1. Technique for disguising malicious activity as legitimate
- 2. Unauthorized access to or control over a computer system
- 3. An attack that overwhelms a network with traffic
- 5. A method of tricking users into revealing sensitive information
- 8. Framework for describing cyber threat information
- 10. Malicious software that spreads without user action
