After threats are rated, what is the next step recommended by the Threat Model Analysis for an IoT system?

IT Questions BankCategory: IoT SecurityAfter threats are rated, what is the next step recommended by the Threat Model Analysis for an IoT system?

After threats are rated, what is the next step recommended by the Threat Model Analysis for an IoT system?

  • Document the IoT system architecture.
  • Decompose the IoT system.
  • Recommend mitigation.
  • Identify security objectives.

Explanation: After identifying and rating the threats, an organization must determine the mitigation techniques needed for each threat and select the most appropriate technology that would reduce or eliminate the threat.

More Questions: IoT Security 1.1 Chapter 2 Quiz Answers


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x