IoT, Cryptocurrency

Use the citation rule. Number the answers. Answer the questions below. The number of words (quantity) is not a measure of quality and vice versa but an adequate answer is possible in 500 words to 1,000 words.Question 1. Explain 3 security concerns (number them as i, ii, iii, etc.) with IoT and ways to address them. For each security concern state what it is, why it needs to be addressed, and how it can be addressed (there is no need to provide any detailed step but be able to touch upon the broad steps).Question 2. Explain 3 security concerns (number them as i, ii, iii, etc.) with cryptocurrency and ways to address them. For each security concern state what it is, why it needs to be addressed, and how it can be addressed (there is no need to provide any detailed step but be able to touch upon the broad steps).Question 3. Explain one future risk with reference to IoT and cryptocurrency, and how to address it. in your answer state what the risk is, what the chances are for this to happen, what the impact will be if that were to happen, and what mitigation measures could be proposed. Question 4. From your research, share one technical tool (either open-source and publicly available or a commercial product) that can be used to prevent the risk related to IoT or Cryptocurrency. It is not expected for you to be an expert but this gives you an opportunity to explore a tool. For your own interest, you may consider downloading the tool of your choice and exploring it further.