Across
- 3. Automated sequence of response actions triggered by specific alerts
- 5. The process of linking disparate security events to identify threats
- 6. Fraudulent attempt to obtain sensitive information via deceptive emails
- 11. The process of converting encrypted data back to its original form
- 13. The act of adding contextual information to raw security data
- 14. Network of compromised devices controlled by an attacker
Down
- 1. Device such as a laptop or mobile phone connected to a network
- 2. Regular communication from compromised endpoints to a command-and-control server
- 4. Coordinated automation of security tools and processes
- 7. Continuous data stream collected for threat analysis and system health
- 8. Decoy system set up to attract and study attackers
- 9. Isolated environment for safely analysing suspicious files or code
- 10. Centralised team responsible for monitoring and responding to security incidents
- 12. Prioritising alerts based on severity and potential impact
