to gain unauthorized entry to a computer system, particularly by exploiting little-known weaknesses
the collective skills, knowledge, or other intangible assets of individuals that can be used to create economic value for the individuals, their employers, or their community