None
					                            
						                              A person gains logical or physical access without permission to a network, system, application, data, or other resource.
						                            Source(s):
						                            
								                            
                                                                    NIST SP 800-82 Rev. 2
										                             under Unauthorized Access 
                                                                            NIST SP 800-61									                            
						                            
						                            
						                        
					                            
						                              Any access that violates the stated security policy.
						                            Source(s):
						                            
								                            
                                                                    CNSSI 4009-2015