“…The threat characterization was conducted based on the literature, searching for the most frequently classified threats, and the user requirements, which have been set with by the end-users, in order to align better with their needs in the real-life circle of the assets' operational function [45]. Among them are the external interference or third-party activity (including political/geo-political interference), corrosion, construction defect and mechanical or material failure, natural hazards, operational error, and cyber-attacks [46].…”