Breach analysis