Research should include
- comparing multiple devices
- identifying threats and vulnerabilities
- planning a cyber table-top exercise.
Process/Skill Questions:
- What is the purpose of ethical hacking?
- What are some threats and vulnerabilities of enabled devices?