DOING THREAT INTEL THE HARD WAY - PART 5: ANALYZE THREAT INTELLIGEN...