This assignment focuses on analyzing security vulnerabilities within the Internet of Things (IoT). It examines the role of security protocols, particularly Constrained Application Protocol (CoAP), in addressing these threats. The text also highlights various security technologies relevant to IoT, referencing sources like Forbes and Elsevier publications. It emphasizes the importance of robust security measures in light of potential risks posed by unsecured IoT devices.