EXAMPLES: Gaps in the ICT security are searched for by the persons who have different goals; however, in order to develop a responsible approach for unveiling the gaps in the ICT security, it is important to create suitable conditions for a person, who has detected a gap and wants to remedy it, to cooperate with the <cyber security entities> whose ICT security loophole was disclosed.