Cyber attack


1. An attack, via cyberspace, targeting an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information. (CNSSI 4009).

Source: NSTAC Report to the President on a Cybersecurity Moonshot, National Security Telecommunications Advisory Committee (NSTAC), https://www.dhs.gov/sites/default/files/publications/NSTAC_CyberMoonshotReport_508c.pdf

2. An attempt to hack or otherwise disrupt a computer system or systems. Like “hack”, this is a very imprecise term. In some cases, it may be even more imprecise if it is used to refer to unsuccessful attempts to hack whereas “hack” is generally used to refer only to successes.

Source: Election Cybersecurity 101 Field Guide – Glossary, Center for Democracy & Technology, https://cdt.org/insight/election-cybersecurity-101-field-guide-glossary/

3. Action taken in cyberspace that creates noticeable denial effects (i.e., degradation, disruption, or destruction) in cyberspace or manipulation that leads to denial that appears in a physical domain.

Source: U.S. Cyberspace Solarium Commission, March 2020, https://subscriber.politicopro.com/f/?id=00000170-c638-d8f7-a7f1-f63b33510000

4. Action taken in cyberspace that creates noticeable denial effects (i.e., degradation, disruption, or destruction) in cyberspace or manipulation that leads to denial that appears in a physical domain.

Source: U.S. Cyberspace Solarium Commission, March 2020, https://subscriber.politicopro.com/f/?id=00000170-c638-d8f7-a7f1-f63b33510000