Any attempt to do any of the following things, successful or otherwise, is a violation of this section: (a) probe, scan, test the vulnerability of, interfere with, or disrupt any system or network. (b) breach or otherwise circumvent any security or authentication measures. (c) access, tamper with, or gain unauthorized access to non-public areas or parts of the Services.