“…However, the motivation of these attackers is usually presented in relation to the automation level of mines, goal/business impact, mode of attack, and attackers’ profile/model (e.g., hacktivists, competitors, cybercriminal syndicates, employees, terrorists). The attackers’ profile/model, in turn, also depends on the attackers’ skills/knowledge or location (see [ 55 ]). In another work [ 56 ], the cyber attackers are characterized by taking into account, among others, their motivation, technique used, or types of targets.…”