25.07.2017 Views

MICROSOFT_PRESS_EBOOK_INTRODUCING_WINDOWS_10

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 5<br />

Security and privacy in Windows <strong>10</strong><br />

Microsoft Windows <strong>10</strong> is far more effective than its predecessors when it comes to protecting your<br />

organization and your users from common and not-so-common threats. That shouldn’t come as<br />

a surprise, of course. Since the Trustworthy Computing initiative in 2002, each new version of Windows<br />

has introduced significant security enhancements.<br />

Most casual observers see the obvious manifestations of security, in the form of features that have<br />

a visible set of controls or warnings, such as Windows Defender and the SmartScreen filter that blocks<br />

potentially dangerous downloads. Windows <strong>10</strong> also enables crucial security features in layers that you<br />

can’t see, specifically hardware-based protection, which operates before Windows loads, and networkbased<br />

security capabilities that can be defined and enforced by administrators using Group Policy and<br />

management tools.<br />

Windows <strong>10</strong> also includes a new, potentially game-changing security feature that has the potential to<br />

eliminate the weakest link in present-day computer security. The new identity features in Windows <strong>10</strong>,<br />

built around sophisticated biometric sensors and easy-to-use multifactor authentication, can completely<br />

replace passwords, eliminating an entire class of security threats.<br />

And in an age where a new data breach seems to make the news every week, concerns over privacy<br />

are increasingly common. To make “Windows as a Service” possible, Windows <strong>10</strong> collects diagnostic<br />

and analytic data from PCs, including information about device capabilities, error reporting, and usage<br />

statistics.<br />

In this chapter, I offer an overview of the multiple layers of security in Windows <strong>10</strong> and detail your<br />

privacy options for individual PCs and managed networks.<br />

The evolution of the threat landscape<br />

Computer security experts like to talk about the “threat landscape,” a wide-ranging and constantly<br />

evolving set of ways that malicious outsiders can attack devices and networks. In the past, hackers<br />

were motivated by personal fame and bragging rights. Today, organized criminal gangs have turned<br />

cyber attacks into big business, transforming their victims’ misery into profits with ransomware, click<br />

fraud, and identity theft. Politically motivated attackers might be more interested in stealing secrets<br />

or causing damage and disruption.<br />

57

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!