IoT is a fuzzy term and this whitepaper describes the IoT landscape as Cisco views it. It provides a framework for our discussion in class. 1. Summarize the whitepaper. 2. Consider a smart voice recognition system like Siri, connected to the cloud. List 5 examples of security issues that could result if an attacker targets this system maliciously. The security diagram at the end of the whitepaper (Fig 10) gives a sense of different layers of security in an IoT system, and things could go wrong at anyone of these levels.