THE CORE OF CYBER THREAT INTELLIGENCE: DATA COLLECTION, PROCESSING, AND DISSEMINATION