Motion Computing le1600 부록 매뉴얼

다운로드
페이지 9
 
Customer Whitepaper:  Motion Tablet PC Security Basics, Rev A03 
Page 5 
 
Layers of Security 
 
Within each of the areas of vulnerability there are several security technologies and techniques 
available to harden the system.  No technology by itself will completely protect a client or an 
organization.  Instead, multiple technologies should be used together to increase the protection of 
a system.  The individual layers combine to strengthen or harden a system. 
 
Example:  Single Factor Authentication 
 
Example:  Multi-factor Authentication 
 
 
 
 
TPM 
 Smart Card 
(What do I have?) 
 Fingerprint Scan 
(Who am I?) 
Username and Password 
(What do I know?) 
(What machine 
am I using?) 
  
  
  
Username and Password