Search on-line to find an example of a recent computer data or security breach. Provide the URL and a short description of the breach giving details of who was affected, when and where it occurred. 2: A program is used by a company to allow customers to order products on-line: a. Who might want to attack the program? b. What type of harm could occur? c. List some vulnerabilities that the program might have. 3: Describe a situation where a weak but easy-to-use password may be adequate.