Assessing and Mitigating the Vulnerabilities of Security Architectures and Designs
Information system devices all use the universal computer hardware model shown in Figure 8.1, but each is otherwise designed for its own specific purpose. Whether the technology is designed for a single user or it supports millions of users, the model is the same. In this section, we break down the specific security needs for each technology, from client-based systems through to the cloud, and how threats and vulnerabilities are managed in their unique way.
Client-Based Systems
Client-based systems support several applications on a single device, for example, a smartphone, smartwatch, or workstation. Such devices do not require networks and can run without networking support.
Such devices depend on the individual to manage the security. Most of these individuals are not sophisticated when it comes to computers, and often fail to add security features such as adding a password or using biometrics...