The Cycle Of Cyber Threat Intelligence