Describe device-based threats and security controls