“…The combination of these three words creates the main guidelines for protecting and securing information. Cloud/ Cluster/ Big data [100], [101], [117], [123], [134], [143], [164], [171], [197] 3 Industry [130], [52], [148], [171], [206], [ IoT devices in general Hardware [94], [95], [112], [114], [163], [168], [179], [180] Software [97], [98], [113], [122], [141], [152], [155], [157], [160], [181], [193]…”