Motion Computing le1600 부록 매뉴얼

다운로드
페이지 9
 
Customer Whitepaper:  Motion Tablet PC Security Basics, Rev A03 
Page 3 
 
the security policies step so that improvements and changes can be made as attacks and 
vulnerabilities change. 
 
 
 
 
Areas of Vulnerability 
 
When assessing an organization’s or platform’s risk, there are four areas of vulnerability. These 
areas are access control, application and data protection, client hardware protection, and network 
protection. Security mechanisms are the techniques and technologies that can be deployed within 
each area to achieve the security policy objectives. The security polices will dictate the level of 
protection and security mechanisms implemented within each area. 
 
 
 
Develop 
Policy 
Report and 
Audit 
Assess 
Risk 
Implement 
Technology