Explain who are the potential victims of the organization's data breach? What is meant by social engineering? Providde the example. Describe how identity theft can happen. Write down benefits of e-business. Write down the major kinds of e-business transactions? Write down the advantage of using cloud computing as platform for e-government?