2.1 Evaluate the weaknesses in Data Shield’s current cybersecurity framework that contributed to the (10 marks) breach.