25.07.2017 Views

MICROSOFT_PRESS_EBOOK_INTRODUCING_WINDOWS_10

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Malware and phishing attacks typically cast an indiscriminate net. By contrast, targeted attacks aim<br />

to exploit weaknesses in large organizations. Government agencies and companies that do business in<br />

sensitive industries—defense, banking, and energy, for example—have to be constantly aware of the<br />

potential for attacks from well-funded, technically skilled outsiders.<br />

And don’t assume that your organization is too small or inconsequential to be a target for computer<br />

crime. If your small business is connected to one of those large targets—even indirectly, as a subcontractor<br />

or as part of the supply chain, for example—you might find yourself in the crosshairs, with the<br />

attackers counting on being able to work their way up to bigger, even more lucrative targets.<br />

The threat landscape certainly includes malware and intrusions, but it also includes data breaches,<br />

unauthorized access to local and network resources, and physical theft.<br />

In general, attacks can occur at any layer of the stack. Malicious agents can lurk in software, in seemingly<br />

innocent webpages or documents attached to an email message, or in packets on a network.<br />

They can target vulnerabilities in the operating system or in popular applications. Some of the most<br />

successful attacks in recent years have come through so-called social engineering, where a would-be<br />

attacker pretends to be something he isn’t—forging the sender’s name on an email message to convince<br />

its recipient to open a booby-trapped attachment or visit a compromised website, for example.<br />

Damage can escalate quickly if the attacker steals the identity of a support technician or network<br />

administrator who signs in to a compromised device using credentials that allow greater access to<br />

network resources.<br />

You can also become a victim through no fault of your own, if a third party stores your credentials<br />

insecurely and then suffers a data breach.<br />

Securing hardware<br />

The first layer of protection for a Windows <strong>10</strong> device is the hardware itself. Key security features in<br />

Windows <strong>10</strong> (originally introduced in Windows 8.1) take advantage of modern hardware designs.<br />

Although you can install and run Windows <strong>10</strong> on older hardware, you’ll get best results when these<br />

two capabilities are present:<br />

■ ■ Unified Extensible Firmware Interface (UEFI) After 30 years, the PC BIOS has finally been<br />

retired. Its replacement is UEFI, a firmware interface that takes over the functions traditionally<br />

performed by the BIOS. UEFI plays a critical role in security with Windows <strong>10</strong>, offering<br />

the Secure Boot capability and support for self-encrypted drives, for example. (I’ll say more<br />

about both of those features later in this chapter.) UEFI has been a requirement for original<br />

equipment manufacturers (OEMs) to certify a system or hardware device for Windows 8 or<br />

later under the Windows Hardware Certification Program (formerly known as the Windows<br />

Logo program).<br />

58 CHAPTER 5 Security and privacy in Windows <strong>10</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!