Indian Cyber Army’s Cyber Intelligence/cyber threat intelligence is to acknowledge insight strategies, methods, and systems (TTP) and also different sorts of activities existed sometime before the cyberspace was conceived. Insight is frequently observed as hostile in nature when seen from the focal point of spying and gathering tasks yet its definitive intention is likewise similarly established in the defense.
In a military context, authorities need to know the intent of the adversary to either make better strategic choices on the battlefield (offense) or to all the more suitably get ready for an assault (safeguard). The definitions and tradecraft utilized by different government and military organizations fill in as the best foundation for understanding cyber threat intelligence.
The insight life cycle is something we will need to utilize broadly in cyber intelligence. The knowledge cycle is a circular and rehashed procedure to convert information into intelligence helpful to meeting an objective of the client; it has the following steps:
- Planning and direction
At first the most important is to figure out what your prerequisites are. To suitably create any amount of intelligence out of information you ought to have a characterized objective and aims. This could be something as straightforward as needing to know the command and control servers of a bit of malware with the goal that you can block it on your network, to know the kind of data frameworks your target uses so you can infiltrate them.
Where and how you acquire the data and information to process. This can be honey pots, Firewall logs, Intrusion Detection System logs, scans of the Internet, etc.
The conversion of your collected information into something you can use. E.g. being able to access and parse through the data you collected. This may apply to how you store and access the data or the actual parsing of data such as converting it to human readable information such as ASCII from binary data.
You will take your data and turn it into an intelligence product. This is done through analysis and interpretation and thus is heavily dependent on the analyst