Accessing data not intended for the client or logging into a server or account that the client is not authorized to access.</li> <li>Attempting to probe, scan, or test the vulnerability of a system or network, or to breach security or authentication measures without proper authorization.</li> <li>