Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in this Wired article.
Scenario Tasks of this Type
- 2 factor authentication
- Computer
- Data
- Find a reliable hosting provider
- How can I prevent getting a virus infection from an email
- How do I know if someone else is accessing my email account
- How to protect your phone from virus infection
- I want to be protected from malicious emails
- I want to destroy data
- I want to ensure that my data is never lost
- I want to prevent unauthorised access to my data
- I want to protect my computer from virus infection
- I want to protect my email account from unauthorised access
- I would like to prevent others from accessing my computer
- I'm worried someone is trying to lure me with a fake email (phishing)
- Minimising damage from a lost or stolen computer
- My Website
- Protect files and messages on my phone
- Reset passwords and security questions
- Social Network
- Test my site for vulnerabilities