None
A person gains logical or physical access without permission to a network, system, application, data, or other resource.
Source(s):
NIST SP 800-82 Rev. 2
under Unauthorized Access
NIST SP 800-61
Any access that violates the stated security policy.
Source(s):
CNSSI 4009-2015