Tasks
Identify a networked technology you use at home, at work, or as a personal convenience.
Research and identify three potential threats to endpoint security of the device, and detail a mitigation mechanism for each threat.
Also explain why your mitigation strategies would work.
Submit the report to your instructor.
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: APA
Length: 2-2 pages
Spelling & Grammar count
Attachment:- Mitigation.rar