During a vulnerability scan, you discover some new systems in the network. After investigating this, you verify that these systems are not authorized because someone installed them without going through a standard approval process. What does this describe?