security breach security management security monitoring security expenditure information security system security authentication encryption computer virus computer intrusion disaster recovery access control cyber security cyber attack denial of service hacker hijack infosec breach unauthorized access business continuity leakage theft fraud steal