You explored the concepts of security perimeters, application security and attack surfaces of existing and emerging technologies.
1. Research how IoT and mobile technology is impacting the attack surface.
2. Research the essential concepts and steps an organization should take to control the attack surface attributed to BYOD.
3. Explain application security and resilience.