2.6 Compare the motivations for a cyber attack in key sectors