LetsDefend Academy

Online practicing and training platform for blue team members

Cyber Threat Intelligence Gathering Methods

Collecting threat intelligence data is the first step. In order to analyze and interpret the data, it is necessary to collect the data first.

Cyber threat intelligence data is divided into a few categories according to the collection methods.

  1. OSINT: It is an intelligence typeobtained from open sources.
  2. HUMINT: It is an intelligence type obtained from a person in the field.
  3. GEOINT: It is an intelligence type obtained using satellite and aerial photographs.
  4. SIGINT: It is a type of intelligence obtained by interfering with signals.