2.5 Identify key sectors that are most vulnerable to a cyber attack