Monitoring

1234567891011121314
Across
  1. 3. A notification system that warns administrators of potential security incidents (8 letters).
  2. 8. The process of collecting logs from multiple sources into a centralized location for analysis (14 letters).
  3. 10. Alerts generated by network devices to notify administrators of significant events (4 letters).
  4. 12. A tool used to identify security weaknesses in systems and applications (20 letters).
  5. 13. The act of examining systems or networks for vulnerabilities or threats (8 letters).
  6. 14. The process of generating documents that summarize security findings and incidents (9 letters).
Down
  1. 1. Software designed to detect and remove malicious programs from a computer system (9 letters).
  2. 2. Isolating potentially harmful files or devices to prevent the spread of malware (10 letters).
  3. 4. A network protocol that collects IP traffic information for analysis (7 letters).
  4. 5. A platform that provides real-time analysis of security alerts generated by network hardware and applications (4 letters).
  5. 6. A standard for automating vulnerability management and compliance checks (4 letters).
  6. 7. A strategy to prevent sensitive information from being shared or leaked outside the organization (3 letters).
  7. 9. Long-term storage of logs and data for compliance and future reference (9 letters).
  8. 11. Security standards or best practices used to evaluate the configuration of systems (10 letters).