Information Information in the Internet of Things is widely distributed throughout component systems, so that any successful capture of a system will likely result in capture of information to which that system has access. Wide Systems Systems composing the Internet of Things are uniquely susceptible to capture, due to a number of their characteristics. Their ubiquity and physical distribution afford attackers with greater opportunity to gain physical or logical proximity to targets Increased mobility and interoperability amplify the threat to loT systems, in that they complicate access control by enabling an attacker to introduce compromised systems into the environment or remove systems in order to compromise and reintroduce them without detection. They also provide opportunity for attackers with a foothold in the environment to compromise transient systems in order to spread compromise to other environments. However, mobility may also dampen the threat by narrowing the window of opportunity to attack transient systems. The heterogeneity of IoT systems is another factor in capture. Heterogeneity can complicate update and patch procedures to the point of increasing the window of vulnerability to a specific attack, but it may also limit threat propagation by requiring ifferent weapon actions to successfully capture different systems, provided the vulnerability isn't found in the common channels and methods of interoperability.