Motion Computing le1600 부록 매뉴얼
Customer Whitepaper: Motion Tablet PC Security Basics, Rev A03
Page 3
the security policies step so that improvements and changes can be made as attacks and
vulnerabilities change.
vulnerabilities change.
Areas of Vulnerability
When assessing an organization’s or platform’s risk, there are four areas of vulnerability. These
areas are access control, application and data protection, client hardware protection, and network
protection. Security mechanisms are the techniques and technologies that can be deployed within
each area to achieve the security policy objectives. The security polices will dictate the level of
protection and security mechanisms implemented within each area.
areas are access control, application and data protection, client hardware protection, and network
protection. Security mechanisms are the techniques and technologies that can be deployed within
each area to achieve the security policy objectives. The security polices will dictate the level of
protection and security mechanisms implemented within each area.
Develop
Policy
Report and
Audit
Assess
Risk
Implement
Technology