Hostile actions against a computer system or network can take two forms. One form – a cyber attack – is destructive in nature. An example of such a hostile action is erasure by a computer virus resident on the hard disk of any infected computer.
In the course of just a few decades, information technology has become an essential component of American life, playing a critical role in nearly every sector of the economy.