Participant category | A1 | A2 | B1 | D1 | D2 | F1 | Related area |
Reliance | Operations built on networks | Electronic nature of work | Cessation of operations when there is a defect in Information Systems | Most citizen Services are offered online | Rapid transformation into technical | Locating accidents by Smart comprehensive databases | Cyberspace |
Security | Increasing intrusions | Development of protection measures | Access to SCADA | Breakthrough government websites | Maintaining access information | Repetitive false alarms | |
Trust | Not to be trusted | Probability of access to critical information | Need for continuous updating | Only for administrative services | “Necessary evil” | If there is an alternative option | |
Threat | Underestimated threat | -Renewed threat -Threat sources | -Same threats -Still under threat | Exaggerated Threat | Non-comparative threats | Changing nature of the threat | Cyberterrorism conventional terrorism |
Awareness | Perception level | Educational programmes | Personal responsibility | Means of awareness | Attention of the organisation | Media and awareness | |
Impact | Impact assessment | High influence | Diverse impacts | National impacts | Psychological impact | -Limited effects -Bearable | |
Role | Vital role of the organisation | Daily necessities | Major national income | -“Indispensable” -“Irreplaceable” | Security stability | n/a | National security |
Cooperation | Coordination | Information/ Expertise exchange | Domestic/ International Cooperation | Joint body | Individual/ Everyone responsibility | Crisis management | |
Strategy | Reforms | Research and Studies | Continuous development | Recruiting hackers | Intellectual security | Renounce extremism | |
Geopolitics | Neighbouring countries | Cross-border force | Energy sources | Historical ideological antagonism | “Arab Spring” | Sanctities |