I doubt I'll be able to live up to that challenge, but I'm pretty sure others will.
From my perspective, the system's vulnerability will depend on who uses it and for what : -
- A government using it for military or similar operations will likely take ample measures to ensure that it's designed with security in mind.
- A private organization using it to cater to public requirements isn't likely to prioritize security --- unless there are stringent government regulations dictating requirements & penalizing vendors / manufacturers for non-compliance.
In both cases, entities may be inclined to introduce & overlook backdoors into the systems to 'play around with' --- but despite that, most people will appreciate the technology...
Shannon D'Cruz,
CISM, CISSP
www.linkedin.com/in/shannondcruz