Development of security
1. As a security analyst for Hospital System , identify security issues involved in the development of security architecture solutions and implementation plans, as well as oversee research and deploy new technologies.
2. Check the internet and the Common Vulnerabilities and Exposures (CVE) List for networked IoT or IoMT devices with publicly known problems identified in the past six months.
3. Select two devices related that might be relevant to the organization setting and review what is known about the vulnerabilities of these devices.
- For each device, include background information about the device, a description of the vulnerability, possible solutions that have been identified to fix the vulnerability, and your recommendation on whether the organization should avoid the product.
- Use this Memo Template to record your work.