S. no | Device protection | Data protection | User privacy |
---|---|---|---|
1 | Asset management | Strong encryption capability of IoT device | Disassociated data management |
2 | Vulnerability management | Sanitation of sensitive data | Informed decision making |
3 | Access management | Provide secure back-up | Processing permissions management |
4 | Incident detection | Verify the identification of other computing devices | Information flow management |