What is the concept of an 'attack' in the context of information security, and how does it encompass deliberate actions or strategies employed by cybercriminals or malicious actors to exploit vulnerabilities, compromise systems, steal data, or disrupt digital operations, thereby posing a threat to the confidentiality, integrity, and availability of information and technology assets?