1.3 The threat intelligence lifecycle