Based on the Target Data Breach answer the following questions and use only information from authoritative or scholarly sources and list references
- identifying the type of breach
- identifying and explaining how the breach occurred (or suspicions by authorities as to how it may have occurred)
- identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems
- identifying and discussing technological improvements that would help prevent recurrence