1. Unauthorized access: When someone gains access to a computer system or network without permission, it is considered unauthorized access.
2. Unauthorized modification: Making changes to files, programs, or settings on a computer system without proper authorization is considered unauthorized modification.
3. Unauthorized use: Using a computer system or network for purposes not approved by the owner or administrator is considered unauthorized use.
4. Unauthorized disclosure: Sharing confidential or sensitive information from a computer system without permission is considered unauthorized disclosure.