What does a Security Breach and How Does It Happen? The Definitive Guide to Cyber attack