Identify a networked technology you use at home, at work, or as a personal
convenience. Research and identify three
potential threats to endpoint security of the device, and detail a mitigation mechanism for each threat.
Also explain why your mitigation
strategies would work. Submit the report to your instructor.
Networked Technology:
Potential Threat 1:
Mitigation Mechanism:
Explanation:
Potential Threat 2:
Mitigation Mechanism:
Explanation:
Potential Threat 3:
Mitigation Mechanism:
Explanation:
Field of study: