Impact Impact consists of techniques that adversaries use to disrupt availability or compromise integrity of your data ID Name MS-T839 Data corruption MS-T838 Data encryption for impact (Ransomware) MS-T837 Data manipulation