The role of many nation-state countries is to gain access to state infrastructure and hold it at risk. While the affected state may be countering state-launched cyberattacks, aggressor states leverage proxies and cutouts to expose weaknesses in critical infrastructure, smart cities, and smart devices that leverage IoT.
Up to this point, you have been exposed to many areas of cybersecurity policy, nation-state capability, threats, responses, and much more.
The opportunity zone to gain access to, exploit, and hold a system/device at risk by the nation-state and proxy hackers has increased.
(Prompt Question 1) Thinking critically, how would you illuminate the threat of IoT advancement to industry technology sectors that focus much of their time on the development and integration and not on the protection of fielded IoT?
(Prompt Question 2) Thinking critically, who bears the bulk of the blame when IoT (e.g., Alexa, Siri, etc.) devices are compromised, and malicious activity leads to the loss of life?
The post Internet of things first appeared on COMPLIANT PAPERS.