Use of Unauthorized Access Device is the intentional or unauthorized use of any device, system, application, network, or resource that is not authorized to be used. This includes, but is not limited to, computers, networks, mobile devices, passwords, and unauthorized software. It can also be used to gain access to data or systems that the user is not authorized to access. Types of Use of Unauthorized Access Device include: 1. Password Cracking: This is when someone tries to gain access to a system by attempting to guess or crack the user's password. 2. Malware: This is when malicious software is used to gain access to a system or data. 3. Phishing: This is when someone attempts to gain access to a system or data by pretending to be someone else. 4. Spoofing: This is when someone tries to gain access to a system or data by pretending to be from a legitimate source. 5. Scanning: This is when someone scans a system or network to look for vulnerable targets. 6. Brute Force Attacks: This is when someone tries to gain access to a system or data by using automated tools to guess passwords.