Update image sources and alt-text in hardware-security.md

This commit is contained in:
Paolo Matarazzo
2024-04-09 07:09:19 -04:00
parent 791e1eac77
commit 6a478b9200
3 changed files with 5 additions and 5 deletions

View File

@ -7,7 +7,7 @@ ms.date: 03/12/2024
# Hardware security # Hardware security
:::image type="content" source="images\hardware.png" alt-text="aas" lightbox="hardware.png"::: :::image type="content" source="images\hardware.png" alt-text="Diagram of containng a list of security features." lightbox="hardware.png" border="false":::
Today's ever-evolving threats require strong alignment between hardware and software technologies to keep users, data, and devices protected. The operating system alone cannot defend against the wide range of tools and techniques cybercriminals use to compromise a computer. Once they gain a foothold, intruders can be difficult to detect as they engage in multiple nefarious activities ranging from stealing important data and credentials to implanting malware into low-level device firmware. Once malware is installed in firmware, it becomes difficult to identify and remove. These new threats call for computing hardware that is secure down to the very core, including the hardware chips and processors that store sensitive business information. With hardware-based protection, we can enable strong mitigation against entire classes of vulnerabilities that are difficult to thwart with software alone. Hardware-based protection can also improve the system's overall security without measurably slowing performance, compared to implementing the same capability in software. Today's ever-evolving threats require strong alignment between hardware and software technologies to keep users, data, and devices protected. The operating system alone cannot defend against the wide range of tools and techniques cybercriminals use to compromise a computer. Once they gain a foothold, intruders can be difficult to detect as they engage in multiple nefarious activities ranging from stealing important data and credentials to implanting malware into low-level device firmware. Once malware is installed in firmware, it becomes difficult to identify and remove. These new threats call for computing hardware that is secure down to the very core, including the hardware chips and processors that store sensitive business information. With hardware-based protection, we can enable strong mitigation against entire classes of vulnerabilities that are difficult to thwart with software alone. Hardware-based protection can also improve the system's overall security without measurably slowing performance, compared to implementing the same capability in software.

View File

@ -45,7 +45,7 @@ Increase protection and efficiency with Windows 11 and chip-to-cloud security. M
In Windows 11, hardware and software work together to protect sensitive data from the core of your PC all the way to the cloud. Comprehensive protection helps keep your organization secure, no matter where people work. This simple diagram shows the layers of protection in Windows 11, while each chapter provides a layer-by-layer deep dive into features. In Windows 11, hardware and software work together to protect sensitive data from the core of your PC all the way to the cloud. Comprehensive protection helps keep your organization secure, no matter where people work. This simple diagram shows the layers of protection in Windows 11, while each chapter provides a layer-by-layer deep dive into features.
:::image type="content" source="images\chip-to-cloud.svg" alt-text="Disagram of chip-to-cloud containng a list of security features." lightbox="chip-to-cloud.svg" border="false"::: :::image type="content" source="images\chip-to-cloud.svg" alt-text="Diagram of chip-to-cloud containng a list of security features." lightbox="chip-to-cloud.svg" border="false":::
Learn more: [Windows security features licensing and edition requirements](https://learn.microsoft.com/en-us/windows/security/licensing-and-edition-requirements?tabs=edition) Learn more: [Windows security features licensing and edition requirements](https://learn.microsoft.com/en-us/windows/security/licensing-and-edition-requirements?tabs=edition)

View File

@ -10,11 +10,11 @@ ms.topic: overview
>[!NOTE] >[!NOTE]
> This article is an excerpt from the Windows 11 security book. For an in-depth exploration, refer to the complete book: [Windows 11 security book](..\book\index.md)." > This article is an excerpt from the Windows 11 security book. For an in-depth exploration, refer to the complete book: [Windows 11 security book](..\book\index.md)."
:::image type="content" source="..\book\images\hardware.png" alt-text="aas" lightbox="..\book\images\hardware.png"::: :::image type="content" source="..\book\images\hardware.png" alt-text="Diagram of containng a list of security features." lightbox="..\book\images\hardware.png" border="false":::
[!INCLUDE [hardware-root-of-trust](..\book\includes\hardware-root-of-trust.md)] [!INCLUDE [hardware-root-of-trust](../book/includes/hardware-root-of-trust.md)]
[!INCLUDE [silicon-assisted-security](..\book\includes\silicon-assisted-security.md)] [!INCLUDE [silicon-assisted-security](../book/includes/silicon-assisted-security.md)]
<!--> <!-->
Learn more about hardware security features support in Windows. Learn more about hardware security features support in Windows.