Areas Of Vulnerability - Motion Computing LE1600 White Paper

Motion computing le1600: supplementary guide
Hide thumbs Also See for LE1600:
Table of Contents

Advertisement

the security policies step so that improvements and changes can be made as attacks and
vulnerabilities change.
Assess
Develop
Risk
Policy
Report and
Implement
Audit
Technology

Areas of Vulnerability

When assessing an organization's or platform's risk, there are four areas of vulnerability. These
areas are access control, application and data protection, client hardware protection, and network
protection. Security mechanisms are the techniques and technologies that can be deployed within
each area to achieve the security policy objectives. The security polices will dictate the level of
protection and security mechanisms implemented within each area.
Customer Whitepaper: Motion Tablet PC Security Basics, Rev A03
Page 3

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LE1600 and is the answer not in the manual?

Questions and answers

Table of Contents