Discussion Post: Computer Security
Securing IoT Devices: What are the Challenges?
Security practitioners suggest that key IoT security steps include:
• Make people aware that there is a threat to security;
• Design a technical solution to reduce security vulnerabilities;
• Align the legal and regulatory frameworks; and
• Develop a workforce with the skills to handle IoT security.
The response should include a reference list. Using double-space, Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.