Participant category

A1

A2

B1

D1

D2

F1

Related area

Reliance

Operations built on networks

Electronic nature of work

Cessation of operations when there is a defect  in Information Systems

Most citizen Services are offered online

Rapid transformation into technical

Locating accidents by Smart comprehensive databases

Cyberspace

Security

Increasing intrusions

Development of protection measures

Access to SCADA

Breakthrough government websites

Maintaining access information

Repetitive false alarms

Trust

Not to be trusted

Probability of access to critical information

Need for continuous updating

Only for administrative services

“Necessary evil”

If there is an alternative option

Threat

Underestimated threat

-Renewed threat

-Threat sources

-Same threats

-Still under threat

Exaggerated Threat

Non-comparative threats

Changing nature of the threat

Cyberterrorism conventional terrorism

Awareness

Perception level

Educational programmes

Personal responsibility

Means of awareness

Attention of the organisation

Media and awareness

Impact

Impact assessment

High influence

Diverse impacts

National impacts

Psychological impact

-Limited effects

-Bearable

Role

Vital role of the organisation

Daily necessities

Major national income

-“Indispensable”

-“Irreplaceable”

Security stability

n/a

National security

Cooperation

Coordination

Information/ Expertise exchange

Domestic/ International Cooperation

Joint body

Individual/ Everyone responsibility

Crisis management

Strategy

Reforms

Research and Studies

Continuous development

Recruiting hackers

Intellectual security

Renounce extremism

Geopolitics

Neighbouring countries

Cross-border force

Energy sources

Historical ideological antagonism

“Arab Spring”

Sanctities