unauthenticated by passing of security,get personal info without permission,private data theft,operating another electronic device,get data without permission,altering code without consent,breaking into a computer or a system,can be used finding bugs,finding loop holes in current code,cool,hacking is exploiting vulnerability,checking on vulnerabilities,non ethical hacking is without permision,altering work without author knowledge,ethical hacking is with permission,accessing data with unauthorized access,getting into system using vulnerability,unauthorized access,manipulating a system,