Unauthorized access should be understood as obtaining the ability to process data stored on various media and storage devices by unauthorized change or falsification of the corresponding rights and powers. A similar phenomenon occurs when some information is intended only for a certain circle of...