
Ultimate access to all questions.
Your organization is planning to deploy a wide range of IoT devices and embedded systems across various operational environments, including manufacturing floors and remote field locations. As a cybersecurity architect, you are tasked with specifying the security requirements for these devices to ensure they are protected against potential threats. Given the diversity of the devices and their environments, which of the following approaches BEST addresses the security considerations for these IoT devices and embedded systems? (Choose one)
A
Prioritize the encryption of data in transit only, as it is the most critical aspect of IoT security, and assume that physical security measures are adequately handled by the operational teams.
B
Apply a uniform set of security measures across all devices, including firewalls and antivirus software, to ensure consistency in security posture regardless of device type or location.
C
Conduct a thorough risk assessment for each type of IoT device and embedded system, considering factors such as the sensitivity of data, potential attack vectors, and environmental risks, to tailor security measures accordingly.
D
Delay the deployment of IoT devices and embedded systems until industry-wide security standards are established and universally adopted to eliminate the need for custom security measures.