1
3.6kviews
Explain the Tasking, Collection, Processing, Exploitation, and Dissemination in cyber security.
1 Answer
| written 3.5 years ago by |
Solution
The process of tasking, collection, processing, exploitation, and dissemination functions (TCPED) of intelligence data drives decision-making and intelligent operations at different levels.
It represents an intelligence cycle from tasking information intelligence process (e.g., by commander) to disseminating it to end users or proper channels. Acting based on the disseminated …