Computer Security Breaches: Analysis Of Incidents And Possible Solutions