ANALYSIS OF A CYBER BREACH