Across
- 3. A notification system that warns administrators of potential security incidents (8 letters).
- 8. The process of collecting logs from multiple sources into a centralized location for analysis (14 letters).
- 10. Alerts generated by network devices to notify administrators of significant events (4 letters).
- 12. A tool used to identify security weaknesses in systems and applications (20 letters).
- 13. The act of examining systems or networks for vulnerabilities or threats (8 letters).
- 14. The process of generating documents that summarize security findings and incidents (9 letters).
Down
- 1. Software designed to detect and remove malicious programs from a computer system (9 letters).
- 2. Isolating potentially harmful files or devices to prevent the spread of malware (10 letters).
- 4. A network protocol that collects IP traffic information for analysis (7 letters).
- 5. A platform that provides real-time analysis of security alerts generated by network hardware and applications (4 letters).
- 6. A standard for automating vulnerability management and compliance checks (4 letters).
- 7. A strategy to prevent sensitive information from being shared or leaked outside the organization (3 letters).
- 9. Long-term storage of logs and data for compliance and future reference (9 letters).
- 11. Security standards or best practices used to evaluate the configuration of systems (10 letters).
