Chapter 9 Security Vulnerabilities, Threats, and Countermeasures
Process states or operating states are various forms of execution in which a process may run.
Applet (mobile code) is a self-contained miniature programs that execute independently of the server that sent them.
Written Lab
-
Name three types of ICSs and describe what they do or how they are used.
-
Name the three pairs of aspects or features used to describe storage.
-
Name some vulnerabilities found in distributed architectures.
-
There are numerous server-based technologies that both increase computation and resource access capabilities and also introduce new risks to be managed. Name at least 10 examples of these technologies (over 30 were included in this chapter).
-
In relation to mobile devices, list seven of the potential on-device security features, list the four main deployment models, and list seven of the issues that should be addressed on a mobile device deployment policy.