the security policies step so that improvements and changes can be made as attacks and
vulnerabilities change.
Assess
Develop
Risk
Policy
Report and
Implement
Audit
Technology
Areas of Vulnerability
When assessing an organization's or platform's risk, there are four areas of vulnerability. These
areas are access control, application and data protection, client hardware protection, and network
protection. Security mechanisms are the techniques and technologies that can be deployed within
each area to achieve the security policy objectives. The security polices will dictate the level of
protection and security mechanisms implemented within each area.
Customer Whitepaper: Motion Tablet PC Security Basics, Rev A03
Page 3
Need help?
Do you have a question about the LE1600 and is the answer not in the manual?
Questions and answers