An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations.

Loading conversations.
Similar or Related Terms
Statistics
119
Characters
22
Words
32.22
Flesch Reading Ease
14.2
Flesch Kincaid Grade