You explored the concepts of security perimeters, application security and attack surfaces of existing and emerging technologies.
- Research how IoT and mobile technology is impacting the attack surface.
- Research the essential concepts and steps an organization should take to control the attack surface attributed to BYOD.
- Explain application security and resilience.
Sample Solution