Security Breach Theories