After threats are rated, what is the next step recommended by the Threat Model Analysis for an IoT system?
- Document the IoT system architecture.
- Decompose the IoT system.
- Recommend mitigation.
- Identify security objectives.
Explanation: After identifying and rating the threats, an organization must determine the mitigation techniques needed for each threat and select the most appropriate technology that would reduce or eliminate the threat.
Exam with this question: IoT Security 1.1 Chapter 2 Quiz Answers
Please login or Register to submit your answer