6. IoT Vulnerability Analysis and Its Security Controls