After threats are rated, what is the next step recommended by the Threat Model Analysis for an IoT system?
- Document the IoT system architecture.
- Decompose the IoT system.
- Recommend mitigation.
- Identify security objectives.
Explanation: After identifying and rating the threats, an organization must determine the mitigation techniques needed for each threat and select the most appropriate technology that would reduce or eliminate the threat.
More Questions: IoT Security 1.1 Chapter 2 Quiz Answers