Breach Lifecycle: The Beginning