the security of the Cloud Service;</p> <p>(b) facilitate the attack or disruption of the Cloud Service or use the Cloud Service</p> <p>to perform a denial-of-service attack, syn flood, unauthorized access, crawling or</p> <p>distribution of malware (including viruses, trojan horses, worms, time bombs,</p> <p>