Summary
In this chapter, we have illustrated every phase of the intelligence life cycle by utilizing a practical application scenario that allowed us to showcase the tools that are commonly used, as well as the datasets that are associated with collecting intelligence information. In our scenario, we created a fictitious organization in the financial services sector that was looking for intelligence that could be used to harden their overall security software. It did this by incorporating network- and binary-based IOCs into the systems that monitored their network traffic and the applications that protected their endpoints within the infrastructure.
In the next chapter, we will wrap up this book. We'll step back and look over everything we've discussed from a 100-foot perspective to ensure we understand how everything works. It's been a wild ride, but all things must come to an end!