7.1.4 Types of security breaches