20. Do not engage in activities that could damage or compromise the security of an account, network, or system. </strong>This includes using deceptive techniques to trick others into revealing sensitive information (phishing), using malicious software (malware), and flooding a target with traffic in order to make a resource unavailable (denial-of-service attacks).