To extract useful intelligence from the gathered bulk data and to improve the efficiency of the composite bulk data, Sam, a threat analyst, follows a data analysis method where he creates a logical sequence of events based on the assumptions of an adversary’s proposed actions, mechanisms, indicators, and implications. To develop accurate predictions, he further takes into consideration the important factors including bad actors, methods, vulnerabilities, targets, and so on.
Which of the following data analysis methods is used by Sam to extract useful intelligence out of bulk data?
Esste
5 days, 20 hours ago7119c34
3 weeks, 5 days ago