Cybersecurity

12345678910111213141516171819202122232425262728
Across
  1. 3. A network security device that monitors and filters incoming and outgoing traffic.
  2. 8. A method used to take advantage of vulnerabilities.
  3. 9. Endpoint Detection and Response, tools for endpoint threat detection and response.
  4. 10. Security Operations Center, a centralized team for monitoring and responding to security incidents.
  5. 11. A one-way function to generate a fixed-size representation of data.
  6. 12. Data Loss Prevention, tools to prevent data exfiltration.
  7. 14. The likelihood of a threat exploiting a vulnerability with impact.
  8. 15. Command and Control infrastructure used by attackers to communicate with compromised systems.
  9. 16. A potential cause of an incident that could harm a system or organization.
  10. 19. Open Source Intelligence, information gathered from publicly available sources.
  11. 22. Mean Time to Detect, the average time to identify a security incident.
  12. 24. A security event compromising the confidentiality, integrity, or availability of information.
  13. 26. A record of events or actions on a system or network.
  14. 28. Isolating suspicious files or programs to observe their behavior.
Down
  1. 1. Mean Time to Respond, the average time to respond to and remediate an incident.
  2. 2. Malicious software such as viruses, worms, or ransomware.
  3. 4. Isolating suspicious files or processes to prevent harm to systems.
  4. 5. Management The process of updating software and systems to address vulnerabilities.
  5. 6. A vulnerability unknown to the vendor, exploited before a fix is available.
  6. 7. Virtual Private Network, encrypting data over untrusted networks.
  7. 13. The part of malware that performs the malicious action.
  8. 15. Cloud Access Security Broker, tools that enforce security policies for cloud services.
  9. 16. Tactics, Techniques, and Procedures used by threat actors.
  10. 17. Remote Monitoring and Management, tools for remote administration of client systems.
  11. 18. Advanced Persistent Threat, a sophisticated and long-term cyber attack.
  12. 20. A social engineering attack to steal sensitive information via deceptive emails or websites.
  13. 21. Indicator of Compromise, data points that signal malicious activity.
  14. 23. Demilitarized Zone, a subnet adding security for external-facing services.
  15. 25. A protocol for collecting and organizing log messages across a network.
  16. 27. Security Information and Event Management, a tool for log aggregation and analysis.