Data collection & Data analysis
This involves gathering information from a variety of sources, such as network logs, security devices, and external threat feeds. This data is used to identify potential security threats and to understand the tactics, techniques, and procedures of attackers. .