Discussion
Security practitioners suggest that key IoT security steps include: Make people aware that there is a threat to security; Design a technical solution to reduce security vulnerabilities; Align the legal and regulatory frameworks; and Develop a workforce with the skills to handle IoT security. Project Plan: Address each of the FOUR IoT security steps listed above in terms of IoT devices.
The response must include a reference list. One-inch margins, double-space, Using Times New Roman 12 pnt font and APA style of writing and citations.