Cybersol Technologies initiated a cyber-threat intelligence program with a team of threat intelligence
analysts. During the process, the analysts started converting the raw data into useful information by
applying various techniques, such as machine-based techniques, and statistical methods.
In which of the following phases of the threat intelligence lifecycle is the threat intelligence team
currently working?
A
Analysis & Production
Module 01 p70
Raw data are converted into information by applying various data analysis techniques such as qualitative and quantitative analyses, machine-based techniques, and statistical methods.