Assessing Terrorist Cyber Threats: Engineering A Functional Construct