An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations.
An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations.