Foundations Of Cybersecurity 5-2: Data Lifecycle