Layers Of Security - Motion Computing LE1600 White Paper

Motion computing le1600: supplementary guide
Hide thumbs Also See for LE1600:
Table of Contents

Advertisement

Layers of Security

Within each of the areas of vulnerability there are several security technologies and techniques
available to harden the system. No technology by itself will completely protect a client or an
organization. Instead, multiple technologies should be used together to increase the protection of
a system. The individual layers combine to strengthen or harden a system.
Example: Single Factor Authentication
Username and Password
Example: Multi-factor Authentication
TPM
(What machine
am I using?)
Smart Card
(What do I have?)
Fingerprint Scan
(Who am I?)
Username and Password
(What do I know?)
Customer Whitepaper: Motion Tablet PC Security Basics, Rev A03
Page 5

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LE1600 and is the answer not in the manual?

Questions and answers

Table of Contents