Investigate the threats and vulnerabilities associated with specialized technologies, including operating within a cloud-based environment.
Examples: mobile, Internet of Things, embedded, real-time operating system, System-on-Chip, field programmable gate array, physical access controls, building automation systems, drones and vehicles, supervisory control and data acquisition systems (SCADA), cloud deployment models; insecure application programming interfaces, improper key management, unprotected storage, insufficient logging and monitoring