6.
Implementing any actions that destroy or attempt to destroy network security, including but not limited to using viruses, trojans, malicious code, phishing, etc., to maliciously scan websites, servers, illegally intrude into systems, illegally obtain data, etc.;