MICROSOFT_PRESS_EBOOK_INTRODUCING_WINDOWS_10
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
CHAPTER 5<br />
Security and privacy in Windows <strong>10</strong><br />
Microsoft Windows <strong>10</strong> is far more effective than its predecessors when it comes to protecting your<br />
organization and your users from common and not-so-common threats. That shouldn’t come as<br />
a surprise, of course. Since the Trustworthy Computing initiative in 2002, each new version of Windows<br />
has introduced significant security enhancements.<br />
Most casual observers see the obvious manifestations of security, in the form of features that have<br />
a visible set of controls or warnings, such as Windows Defender and the SmartScreen filter that blocks<br />
potentially dangerous downloads. Windows <strong>10</strong> also enables crucial security features in layers that you<br />
can’t see, specifically hardware-based protection, which operates before Windows loads, and networkbased<br />
security capabilities that can be defined and enforced by administrators using Group Policy and<br />
management tools.<br />
Windows <strong>10</strong> also includes a new, potentially game-changing security feature that has the potential to<br />
eliminate the weakest link in present-day computer security. The new identity features in Windows <strong>10</strong>,<br />
built around sophisticated biometric sensors and easy-to-use multifactor authentication, can completely<br />
replace passwords, eliminating an entire class of security threats.<br />
And in an age where a new data breach seems to make the news every week, concerns over privacy<br />
are increasingly common. To make “Windows as a Service” possible, Windows <strong>10</strong> collects diagnostic<br />
and analytic data from PCs, including information about device capabilities, error reporting, and usage<br />
statistics.<br />
In this chapter, I offer an overview of the multiple layers of security in Windows <strong>10</strong> and detail your<br />
privacy options for individual PCs and managed networks.<br />
The evolution of the threat landscape<br />
Computer security experts like to talk about the “threat landscape,” a wide-ranging and constantly<br />
evolving set of ways that malicious outsiders can attack devices and networks. In the past, hackers<br />
were motivated by personal fame and bragging rights. Today, organized criminal gangs have turned<br />
cyber attacks into big business, transforming their victims’ misery into profits with ransomware, click<br />
fraud, and identity theft. Politically motivated attackers might be more interested in stealing secrets<br />
or causing damage and disruption.<br />
57