diff --git a/windows/security/book/hardware-on.png b/windows/security/book/hardware-on.png new file mode 100644 index 0000000000..a19e366ddd Binary files /dev/null and b/windows/security/book/hardware-on.png differ diff --git a/windows/security/book/hardware-security.md b/windows/security/book/hardware-security.md index ad5084bc65..c2339a739c 100644 --- a/windows/security/book/hardware-security.md +++ b/windows/security/book/hardware-security.md @@ -7,7 +7,7 @@ ms.date: 04/09/2024 # Hardware security -:::image type="content" source="images\hardware.png" alt-text="Diagram of containng a list of security features." lightbox="images\hardware.png" border="false"::: +:::image type="content" source="images\hardware-on.png" alt-text="Diagram of containng a list of security features." lightbox="images\hardware.png" border="false"::: Today's ever-evolving threats require strong alignment between hardware and software technologies to keep users, data, and devices protected. The operating system alone cannot defend against the wide range of tools and techniques cybercriminals use to compromise a computer. Once they gain a foothold, intruders can be difficult to detect as they engage in multiple nefarious activities ranging from stealing important data and credentials to implanting malware into low-level device firmware. Once malware is installed in firmware, it becomes difficult to identify and remove. These new threats call for computing hardware that is secure down to the very core, including the hardware chips and processors that store sensitive business information. With hardware-based protection, we can enable strong mitigation against entire classes of vulnerabilities that are difficult to thwart with software alone. Hardware-based protection can also improve the system's overall security without measurably slowing performance, compared to implementing the same capability in software.