when data is vandalized, stolen, corrupted or otherwise used in a nefarious way this may be the result of intentional cyber terrorism