About USAID Our Work Locations Policy Press Business Careers USAID Seal - Link to Home Page
 


Computers Vulnerable to Attacks

Attackers have:

  • shut down systems and networks
  • corrupted sensitive data
  • destroyed, modified, and stolen money, data, and software
  • installed malicious code

Previous slide Next slide Back to first slide View graphic version

Star