Illicitly accessing data, systems, computers, or networks, including attempts to probe, scan, or test for vulnerabilities of a system or network or to breach security or authentication measures without the express written consent of the owner of the system or network. </li> <li>