
Answer-first summary for fast verification
Answer: Conduct a thorough risk assessment for each type of IoT device and embedded system, considering factors such as the sensitivity of data, potential attack vectors, and environmental risks, to tailor security measures accordingly.
The BEST approach is to conduct a thorough risk assessment for each type of IoT device and embedded system, considering factors such as the sensitivity of data, potential attack vectors, and environmental risks, to tailor security measures accordingly. This approach ensures that the security measures are appropriate for the specific risks associated with each device and its environment. Option A is incorrect because it overlooks the importance of securing the devices themselves and the data at rest. Option B is incorrect because a one-size-fits-all approach may not adequately address the unique security needs of different devices and environments. Option D is impractical and could unnecessarily delay the benefits of deploying IoT devices and embedded systems.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
Your organization is planning to deploy a wide range of IoT devices and embedded systems across various operational environments, including manufacturing floors and remote field locations. As a cybersecurity architect, you are tasked with specifying the security requirements for these devices to ensure they are protected against potential threats. Given the diversity of the devices and their environments, which of the following approaches BEST addresses the security considerations for these IoT devices and embedded systems? (Choose one)
A
Prioritize the encryption of data in transit only, as it is the most critical aspect of IoT security, and assume that physical security measures are adequately handled by the operational teams.
B
Apply a uniform set of security measures across all devices, including firewalls and antivirus software, to ensure consistency in security posture regardless of device type or location.
C
Conduct a thorough risk assessment for each type of IoT device and embedded system, considering factors such as the sensitivity of data, potential attack vectors, and environmental risks, to tailor security measures accordingly.
D
Delay the deployment of IoT devices and embedded systems until industry-wide security standards are established and universally adopted to eliminate the need for custom security measures.