{{Scenario Type|Scenario Type Description=Access to a protected resource without permission is often times unauthorized and may be malicious. This process and its repercussions are very well described in a [http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ Wired article].}}