– How would you implement trust boundaries in an existing IoT setup? – What is
– How would you implement trust boundaries in an existing IoT setup?
– What is a security baseline? How could a security baseline help in determining a potential security threat?
– List two potential vulnerabilities at the routing layer in IoT. What strategies could you use to mitigate these risks?