Description: Obtaining access refers to the process of exploiting vulnerabilities in a computer system to gain unauthorized access to its resources. This concept is fundamental in the field of cybersecurity, as it involves an attacker’s ability to bypass the security measures implemented in a system. Vulnerabilities can be weaknesses in software, misconfigurations, or even human errors that allow an intruder to access sensitive data or control critical systems. Obtaining access can be carried out through various techniques, such as phishing, code injection, or the use of malware. The relevance of this process lies in its potential to compromise the integrity, confidentiality, and availability of information, which can have devastating consequences for individuals and organizations. Therefore, defending against unauthorized access is a priority in information security, and tools such as antivirus and antimalware are used to detect and prevent these intrusion attempts.