Define Key Terms
Define the following key terms from this chapter, and check your answers in the glossary:
threat hunting
threat feeds
intelligence fusion
security advisories
Common Vulnerability and Exposures (CVE)
false positives
false negatives
true positive
true negative
application scanners
web application scanners
network and port scanners
review logs
configuration reviews
intrusive
nonintrusive
CVSS
base group
temporal group
environmental group
Security Information and Event Management (SIEM)
security monitoring
log collector
data input
Log aggregation
IPFIX
packet captures
user behavior analysis
sentiment analysis
Security Orchestration, Automation, and Response (SOAR)