1
3.6kviews
Explain the Tasking, Collection, Processing, Exploitation, and Dissemination in cyber security.
1 Answer
0
194views

Solution

  • The process of tasking, collection, processing, exploitation, and dissemination functions (TCPED) of intelligence data drives decision-making and intelligent operations at different levels.

  • It represents an intelligence cycle from tasking information intelligence process (e.g., by commander) to disseminating it to end users or proper channels. Acting based on the disseminated …

Create a free account to keep reading this post.

and 4 others joined a min ago.

Please log in to add an answer.