Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
Source(s):
CNSSI 4009-2015
under attack
NISTIR 8323r1
under attack
from
CNSSI 4009-2015
NISTIR 8401
under attack
An attack, via cyberspace, targeting an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information.
Source(s):
NIST SP 1800-10B
from
NIST SP 800-30 Rev. 1
NIST SP 800-30 Rev. 1
from
CNSSI 4009
NIST SP 800-39
from
CNSSI 4009