Steps To Analyze Cloud Network Security Breaches