Assessment: Step 2 of Connected Device Security