HYPERLINK IS REQUIRED
Submit a hyperlink to an example of IoT device/technology that uses some of the mechanisms and functions that we’ve explored in our prior labs. Accompany your hyperlink with a critical reflection (minimum of 500 words but no maximum) that speaks to the following topics:
- What is this, what its primary function, what are its secondary functions (if any)?
- How is security implemented, or not implemented, in your thing?
- What security measures are in place to prevent unauthorized access and manipulation of the technology, and to prevent the theft of the data it is generating and sending?
- On a scale of one to five, how would you rate the security of the technology? Justify your answer, and highlight two areas in which security could be improved, explaining each.