ntentional action in the cyberspace in order to disable, destroy or maliciously control an infrastructure or information system, destroy the integrity of the data or steal controlled information.