HOW UNDERSTANDING AN ATTACK VECTOR CAN PROTECT YOUR DATA WITH X-PHY’S SECURE-BY-DESIGN TECHNOLOGY