SEP2 Crossword

1234567891011121314
Across
  1. 3. Automated sequence of response actions triggered by specific alerts
  2. 5. The process of linking disparate security events to identify threats
  3. 6. Fraudulent attempt to obtain sensitive information via deceptive emails
  4. 11. The process of converting encrypted data back to its original form
  5. 13. The act of adding contextual information to raw security data
  6. 14. Network of compromised devices controlled by an attacker
Down
  1. 1. Device such as a laptop or mobile phone connected to a network
  2. 2. Regular communication from compromised endpoints to a command-and-control server
  3. 4. Coordinated automation of security tools and processes
  4. 7. Continuous data stream collected for threat analysis and system health
  5. 8. Decoy system set up to attract and study attackers
  6. 9. Isolated environment for safely analysing suspicious files or code
  7. 10. Centralised team responsible for monitoring and responding to security incidents
  8. 12. Prioritising alerts based on severity and potential impact