Question 1: Consider the availability of various items related to a smart home (e.g., a home equipped with services like Ring or Alexa) (think about the services provided). What would be different ways to attack the availability of the smart home?
Question 2: What would be ideal ways to defend against availability attacks you described in question number 1.