Researchers could use this information to study breaches by seeing the data provided and connecting the attacks to the reasoning that they were committed. They could research the bank’s security systems and the attackers to see how they were able to get in the systems and how vulnerable these systems were before the attacks took place. Just like other methods of study having the data and previous events in place they can study the behavior and data provided to come up with a hypothesis and conclusion of the overall breach. This type of information researched could provide more information of vulnerabilities.