cyberattacks
different types of code (such as computer viruses, worms, or Trojan horses) that harm computers and networks, and the people and organizations dependent on them. Cyberattacks are used for theft, espionage, and other purposes, and are typically offensive, asymmetric measures; and the perpetrators are difficult to identify.