I’m working on a Computer Science exercise and need support.
During this module, you explored the concepts of security perimeters, application security and attack surfaces of existing and emerging technologies.
- Discuss how IoT and mobile technology are impacting the attack surface.
- Include in your discussion the steps an organization should take to control the attack surface attributed to BYOD.
In preparing your response, include at least one source from professional or academic literature—such as articles from peer-reviewed journals and relevant textbooks. For this course, Wikipedia is not considered an academic or professional reference. Also, proofread and spell check your responses. All sources should be formatted using APA guidelines.