A deliberate computer-to-computer attack that disrupts, disables, destroys, or takes over a computer system, or damages or steals the information it contains is referred to as ______.
cyberattacks
cyberwar
hacktivism
cyberterrorism