In 175 words or more answer the following questions:
Who were the major players in the security breach and what was the breach?
What logical security components were in place and which were missing?
How did the missing features allow the breach and how would you protect it from happening again in the future?
How did the breach affect data confidentiality, integrity, and availability (CIA)?