Operators in the information security field are engaged in a [...]