COMPREHENDING THE FUNCTION OF DATA DESTRUCTION IN CONDITIONING CYBER SECURITY DEFENSES