Accessing Data Intrusion Threats