Which document created in the Threat Model Analysis process will describe the IoT system architecture?
- the expected availability and guaranteed uptime of the IoT system
- the impact of privacy concerns as well as regulation requirements
- the controls that are in place to ensure that evidence is collected on the identity of users accessing and using the IoT system
- the components of the IoT system at each layer
Explanation: During the step of documenting the IoT system architecture of the Threat Model Analysis for an IoT System, the documents created should include the following:
- Components of the IoT system at each layer
- The flow of data between components and between layers
- The technologies, protocols, and standards used to implement the IoT system
Exam with this question: IoT Security 1.1 Chapter 2 Quiz Answers
Please login or Register to submit your answer