Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices