The adversary is trying to manipulate, interrupt, or destroy your systems and data.
Was this helpful?