Understanding threat intelligence metrics
Like any other program, threat intelligence needs evaluation criteria to determine its effectiveness. However, defining metrics that can be helpful for a threat intelligence program assessment is not an easy task and is still being studied by security researchers. Nevertheless, most security researchers and experts use their expertise to define metrics that track the CTI program throughout its life cycle. And that is the approach taken in this section.
Performance metrics, in general, need to tell stories about a system, an application, or a program. In cellular communication, for example, some of the notable metrics include network availability (the ability for subscribers to access network resources), network retainability (the output of services initiated by users such as the success and failure of a data call), and network mobility (the ability to keep using the service while in movement). Each metric category includes other performance...