Actions to penetrate another computers or networks for the purposes of causing damage or disruption.
Data protection from destructive forces and the unwanted actions of unauthorized users
SNIK 2017: Cyber War and Data Security