2Locking Down the OS
Given that the focus is on supporting cloud applications, this should come naturally. By turning Google Chrome OS into a “toaster” and running primarily—if not only—Web apps like Google Docs and Picasa, Google can substantially reduce the attack surface, noted Scott Crawford, an analyst with Enterprise Management Associates.
3Dealing with Plug-ins and Add-ons
4Encrypting Data
5Playing in a Sandbox
6Focus on Securing the Browser
If most of the way the user interacts with the system or applications is through the browser, Google needs to put a focus on ensuring that its Chrome browser is secure, said Jaquith.