Explain the security vulnerabilities and constraints of embedded and specialized systems.
Examples: system control and data acquisition (SCADA), industrial control system (ICS), Internet of Things (IoT), inability to patch