Impact

The adversary is trying to manipulate, interrupt, or destroy your systems and data.