I don’t know how to handle this Computer Science question and need guidance.

HYPERLINK IS REQUIRED

Submit a hyperlink to an example of IoT device/technology that uses some of the mechanisms and functions that we’ve explored in our prior labs. Accompany your hyperlink with a critical reflection (minimum of 500 words but no maximum) that speaks to the following topics:

  1. What is this, what its primary function, what are its secondary functions (if any)?
  2. How is security implemented, or not implemented, in your thing?
  3. What security measures are in place to prevent unauthorized access and manipulation of the technology, and to prevent the theft of the data it is generating and sending?
  4. On a scale of one to five, how would you rate the security of the technology? Justify your answer, and highlight two areas in which security could be improved, explaining each.