1-Discuss the authentication process of accessing secure information from your w

1-Discuss the authentication process of accessing secure information from your work environment.
2-After searching the literature describe a situation encumbered by a security breach. Include in your discussion what security process was in place, how the information was breached, what the outcome was, and what ongoing system or process was put in place.