RECOGNIZING THE ROLE OF DATA DESTRUCTION IN CONDITIONING CYBER SECURITY DEFENSES