Modelling Breach Initiation and Growth