Use given three breach cases: RSA, Target and JPM to answer the given 6 questions. The background to the given cases might not be in detailed or enough to answer the questions. So, you may do more research on the breach cases to answer the questions. Be clear, concise, and thorough in your answer. Proofread for grammatical error and plagiarism. Check the attached file for each case background and instruction.