. . . . "Cyber attacks occur when someone deliberately infiltrates a computer network or system, gaining access to information such as plans for the military or combat data." .