Which document created in the Threat Model Analysis process will describe the IoT system architecture?

IT Questions BankCategory: IoT SecurityWhich document created in the Threat Model Analysis process will describe the IoT system architecture?

Which document created in the Threat Model Analysis process will describe the IoT system architecture?

  • the expected availability and guaranteed uptime of the IoT system
  • the impact of privacy concerns as well as regulation requirements
  • the controls that are in place to ensure that evidence is collected on the identity of users accessing and using the IoT system
  • the components of the IoT system at each layer

Explanation: During the step of documenting the IoT system architecture of the Threat Model Analysis for an IoT System, the documents created should include the following:

  • Components of the IoT system at each layer
  • The flow of data between components and between layers
  • The technologies, protocols, and standards used to implement the IoT system

More Questions: IoT Security 1.1 Chapter 2 Quiz Answers


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x