Which of the following best describes the practice of information sharing within cyber security operations?
The routine task of monitoring and managing software updates and patches.
The protection of sensitive information by using encryption and access controls.
The process of identifying potential cybersecurity threats by analyzing network traffic.
The exchange of intelligence regarding threats, vulnerabilities, and incidents among organizations.